[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Detecting a compromised system



On Sunday 15 February 2009 13:06:29 Nikolaus Rath wrote:
> I expected that it would be pretty easy to spot these modifications.
> So I did exactly the above and then tried to "detect" my changes.
>
> I first looked for any additional packages that might help me with
> this and installed (and configured to the best of my knowledge)
> checksecurity and tiger.

Most security audit tools actually depend on being able to inventory the 
system before an attack.  Installing them after you are 'sploited doesn't 
help.

Try installing them, then making a change that's not detectable.
-- 
Boyd Stephen Smith Jr.                   ,= ,-_-. =.
bss@iguanasuicide.net                   ((_/)o o(\_))
ICQ: 514984 YM/AIM: DaTwinkDaddy         `-'(. .)`-'
http://iguanasuicide.net/                    \_/

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: