427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet148/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   144   145   146   147   148   149   150   151   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
175
Continued
427_Botnet_05.qxd 1/9/07 9:59 AM Page 175


shows example code that adds a new syntactic feature. Stage 3 describes
the introduction of a couple of Trojan horses into the compiler. 
The moral is, as Thompson points out, obvious. “You can’t trust
code that you did not totally create yourself.” Thompson’s two-stage
Trojan attack escapes source-level inspection, since the attack relies on
the subverted compiler. A Trojan planted by the supplier of your oper-
ating system is a little extreme, but substitutions and backdoors can
lurk in any new installation or upgrade. 
Exactly what is protected (or rather monitored; for full protection, you
need to call on backups and/or reinstallation media) depends on which files
and directories you configure it to monitor. In principle, it can be set to
monitor every—or any—file or directory on a monitored system, not just
system files and directory trees. In general, though, this can be counterpro-
ductive. Even on a server on which system files stay fairly static and contain
no user data, you’ll need to make exceptions for files that are changed
dynamically, such as log files. On a system that contains dynamic data, you
need to set up a far more discriminating system.
Tripwire configuration and policy files are signed using the site key,
whereas the database file and probably the report files are signed with the
local key. Once the database is initialized and signed,Tripwire can be run
from cron according to the settings in the configuration file, which specifies
which files and directories are to be monitored and in what detail.
Ignore
flags
specify the changes that are considered legitimate and that should generate an
alert. In check mode, the file system objects to be monitored are compared to
the signatures in the database: Apparent violations are displayed and logged
and can also be mailed to an administrator. Apparent violations can, if found
to be valid, be accepted by selectively updating the database.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   144   145   146   147   148   149   150   151   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish