Intrusion Detection Systems mailing list archives
RE: strings in backdoor binaries
From: ken () wellconnected com (Kenneth Simpson)
Date: Sun, 30 Apr 2000 13:06:27 -0700 (PDT)
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au Hi - actually, tripewire *IS* commerical software - see http://www.tripewire.com You might want to ask them your question (it's not clear I understand your question.) And spending money may give you a warm fuzzy feeling but it's security based on obscurity. Second, we've been hacked twice and both times the sniffer and the backdoor daemon were placed in the directory ... in /var/spool/lp - directories typically not checked by tripewire or aide because of the noise it would generate. Detecting trojan horses is only a small part of any security policy - and just about any *simple* minded scheme will work for gathering digital signatures on critical system binaries provided it's implemented in a secure manner. -- Ken ======================================================================== Kenneth Simpson Well Connected Computing, Inc. Email: ken () wellconnected com 1001 Bridgeway URL: http://wellconnected.com/ Suite 630 Voice: +1.415.332.5018 Sausalito, CA 94965 FAX: +1.415.331.1668 USA, Earth ========================================================================
Current thread:
- RE: strings in backdoor binaries Meritt, Jim (Apr 29)
- <Possible follow-ups>
- RE: strings in backdoor binaries Kenneth Simpson (Apr 30)
