On Wed, 12 Apr 2006, Jason Etchason wrote:
> Once I get home from work today, I want to be able to bring my system back
> up, but not before I am certain I have closed off all vulnerabilities. Then
> I'd also like to setup some form of IDS, but I do not know if that is above
> my skill level. Of course, I gotta learn some time, so I might as well now?
You may want to reinstall the operating system from scratch. Tracking down
vulnerable files can be difficult, especially if you don't have a
specification covering all the attributes and metadata about the files on
your system.
Also in many cases, there may be kernel modules or compromised tools that
make it difficult to analyze and recover. You may want to use a LiveCD or
rescue disk to help analyze your system.
As for an IDS, you have many options to think about: real-time scanning of
network activity, proactively blocking or just alerting, and
after-the-fact detection (like log checkers and file integrity checking).
Jeremy C. Reed
echo '9,J8HD,fDGG8B@?:536FC5=8@I;C5?@H5B0D@5GBIELD54DL>@8L?:5GDEJ8LDG1' |\
sed ss,s50EBsg | tr 0-M 'p.wBt SgiIlxmLhan:o,erDsduv/cyP'
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss