Security Basics mailing list archives
RE: Hide disk in linux
From: "Sistemas Aurensis-Sys Sec" <syssec () aurensis com>
Date: Mon, 5 Apr 2004 08:22:47 +0200
Thank's fro your response. I restricted access to devices with LIDS (Linux Intrusion Detection System), and I can leave to access to specific application. Thank's again Filipe -----Mensaje original----- De: Filipe Litaiff [mailto:filipe_litaiff () optiglobe com br] Enviado el: jueves 25 de marzo de 2004 20:49 Para: Sistemas Aurensis-Sys Sec CC: security-basics () securityfocus com Asunto: RE: Hide disk in linux In Solaris, I would: - Make hardware probing commands as restricted as possible (like drvconfig, devfsadm or prtdiag) - recreate the disk/slice/volume special files. - Mount the filesystems and perform the backup. - remove the disk/slice/volume special files. I really don´t know the exact commands to perform this on Linux, but I´m quite sure thats prossible. In solaris I could go way further, like erasing/recreating scsi controller definitions (sd.conf). Good Luck, Filipe Litaiff -----Original Message----- From: Sistemas Aurensis-Sys Sec [mailto:syssec () aurensis com] Sent: Thursday, March 25, 2004 4:28 AM To: security-basics () securityfocus com Subject: Hide disk in linux Hi everyone, I need to hide a disk device in linux. I want make a disk to disk backup, for example with dd utility dd if=/dev/hda of=/dev/hdb bs=1k conv=sync,noerror but I want that this disk can't mounting by anyone. Is this method to make disk to disk backup correct? It have any problem? I don't like that a possible hacker can mount disk device and get information from the backup disk. The system has installed LIDS on the primary disk, but backup disk (secondary) is not affected. Can anyone help me about how to hide the secondary disk to can't mount? Thank's in advance --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- RE: Hide disk in linux Sistemas Aurensis-Sys Sec (Apr 05)
