4. 检查日志 [iyunv@sky]# last #查看正常情况下登录到本机的所有用户的历史记录
注意”entered promiscuous mode”
注意错误信息
注 意Remote Procedure Call (rpc) programs with a log entry that includes a large number (> 20) strange characters(-^PM-^PM-^PM-^PM-^PM-^PM-^PM-^PM)
7. 检查RPM [iyunv@sky]# rpm –Va
输出格式:
S – File size differs
M – Mode differs (permissions)
5 – MD5 sum differs
D – Device number mismatch
L – readLink path mismatch
U – user ownership differs
G – group ownership differs
T – modification time differs
注意相关的 /sbin, /bin, /usr/sbin, and /usr/bin
8. 检查网络 [iyunv@sky]# ip link | grep PROMISC #正常网卡不该在promisc模式,可能存在sniffer [iyunv@sky]# lsof –i [iyunv@sky]# netstat –nap #察看不正常打开的TCP/UDP端口 [iyunv@sky]# arp –a
* OS dependant tests
Linux
Checking loaded kernel modules... [ OK ]
Checking files attributes [ OK ]
Checking LKM module path [ OK ]
Networking
* Check: frequently used backdoors
Port 2001: Scalper Rootkit [ OK ]
Port 60922: zaRwT.KiT [ OK ]
* Interfaces
Scanning for promiscuous interfaces [ OK ]
[Press to continue] 这里按下 Enter 才能继续
# 第三部分在检测木马以及可疑的档案属性
# 当然,因為木马程式可能会开后门,所以网路服务(port)也在这里检测
# 同时还包含核心模组等等的检测
#再来则是第四部分
System checks
* Allround tests
Checking hostname... Found. Hostname is test.vbird.tw
Checking for passwordless user accounts... OK
Checking for differences in user accounts... [ NA ]
Checking for differences in user groups... Creating file It seems
this is your first time.
Checking boot.local/rc.local file...
- /etc/rc.local [ OK ]
- /etc/rc.d/rc.local [ OK ]
- /usr/local/etc/rc.local [ Not found ]
....(略)....
* Filesystem checks
Checking /dev for suspicious files... [ OK ]
Scanning for hidden files... [ OK ]
[Press to continue] 这里按下 Enter 才能继续
# 第四部分主要在进行系统开机与相关服务的检测
# rc.local 与 password/accounts 的检测都会在这里进行检查
# 此外,在 /dev 裡面也会检查是否有被影响的档案
#接下来是第五部分
Application advisories
* Application scan
Checking Apache2 modules ... [ Not found ]
Checking Apache configuration ... [ OK ]
* Application version scan
- GnuPG 1.2.1 [ Vulnerable ]
- Bind DNS [unknown] [ OK ]
- OpenSSL 0.9.7a [ Vulnerable ]
- Procmail MTA 3.22 [ OK ]
- OpenSSH 3.7.1p2 [ Unknown ]
Security advisories
* Check: Groups and Accounts
Searching for /etc/passwd... [ Found ]
Checking users with UID '0' (root)... [ OK ]
* Check: SSH
Searching for sshd_config...
Found /etc/ssh/sshd_config
Checking for allowed root login... [ OK (Remote root login disabled) ]
Checking for allowed protocols... [ OK (Only SSH2 allowed) ]
* Check: Events and Logging
Search for syslog configuration... [ OK ]
Checking for running syslog slave... [ OK ]
Checking for logging to remote system... [ OK (no remote logging) ]