verify binary files

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: KevinBrownkevin_brown@qwest.net
Date:  
Subject: verify binary files
I set it up on a system. The end user configures it to watch certain
directories and/or files. Then runs it an initial time to get a signature for
Tripwire to compare future checks with. The next time it is run it runs through
its config and rechecks those folders/files and reports any changes. Its up to
the end user to determine why those things changed and determine if it means
they got hacked.

> > > > If I recall, someone listed a command that would verify and list any
> > > > binaries that had changed - does anyone know what the command was?
> > >
> > > It depends on the distribution. On Red Hat systems, try ``rpm --verify''.
> >
> > That should work for any rpm-based dist, right?
>
> Right.
>
> > It'll cover anything installed from the package management system,
> > but will miss the stuff installed from tarballs, etc.
>
> Right again.
>
> > Craig might be looking for tripwire, though. I think there's an Open
> > Source package on Source Forge that does the same stuff as tripwire.
> >
> > I don't see a similar option for dpkg or apt-get. The /usr/ports stuff
> > would have to use something similar to tripwire.
>
> Can someone give me a brief primer on how tripwire is implemented? I
> read somewhere recently that it uses a kernel module on linux and
> basically watches for open() calls (where write access is requested)
> on specific system files. Is this right or not?