Rootkit
Manuel Arostegui Ramirez
manuel at todo-linux.com
Tue Oct 23 19:40:42 UTC 2007
El Lunes, 22 de Octubre de 2007 23:48, Dave Burns escribió:
> Exactly. So there are three contexts in which you are using the tools:
>
> 1) Not sure you've been hacked, just suspicious or vigilant.
> 2) Sure you've been hacked, have not yet rebooted, looking for information.
> 3) Sure you've been hacked, rebooted using a CD (e.g. knoppix) or
> other known-good /.
>
> In situation 1 and 2, you can't totally trust your tools, unless
> they're giving you bad news. In situation 3 your can trust the tools
> as much as you can trust the "known-good /" where they are located. So
> you're never totally sure you're in the clear.
Well, in case 2, you'd not be 100% confident, rootkit are there and they might
installed one on your system, so, let's start to doubt :)
>
> I guess the truly paranoid might boot from a CD and do an audit
> periodically, I guess that might make me feel pretty confident. Hard
> to automate it (and may open up new vulnerabilities), no one wants it
> happening during ordinary working hours, and I don't want to be doing
> it by hand outside ordinary hours. Yuck.
Good point, that's totally crazy in production enviroments.
>
> >To evalue my general system security I use babel
>
> Is that comparable to nagios, or more security oriented?
>
Well, I'm one of the main developers of Babel, so don't take this as a spam,
it fits perfectly in this scenario.
It's security oriented, Babel performs a security level check of the machine,
or hardening. The check consists of a number of auditing tests that obtain a
snap of the security status of each machine. The result is a security index
of the system that is given after each execution.
Just totally off-topic, I'm just curious, Dave, do you speak spanish?
Un saludo!!
Manuel
--
Manuel Arostegui Ramirez.
Electronic Mail is not secure, may not be read every day, and should not
be used for urgent or sensitive issues.
More information about the fedora-list
mailing list