March Meeting Presentations

Bob George plug-discuss@lists.plug.phoenix.az.us
Mon, 11 Mar 2002 08:52:36 -0700


"John (EBo) David" <ebo@leml.la.asu.edu> wrote:

> George Toft wrote:
> >
> > Hi John,
> >
> > Post a ps and let the group dissect it.
>
> Ok... See appended:

 Output of ps won't mean much if a rootkit has already been installed
(search on rootkits - i.e.
http://linux.oreillynet.com/pub/a/linux/2001/12/14/rootkit.html)

Ideally, you'd have tools running up front to detect unauthorized changes.
There are tools though (i.e. chkrootkit - http://www.chkrootkit.org/) to
look for signs of compromise even after the fact.

Running something like aide or tripwire against critical files is a good
detection measure, but it needs to be set up up front.

- Bob