文件入侵:
yum install aide -y
1) Customize /etc/aide.conf to your liking. In particular, add
2 important directories and files which you would like to be
3 covered by integrity checks. Avoid files which are expected
4 to change frequently or which don't affect the safety of your
5 system.
6
7 2) Run "/usr/sbin/aide --init" to build the initial database.
8 With the default setup, that creates /var/lib/aide/aide.db.new.gz
9
10 3) Store /etc/aide.conf, /usr/sbin/aide and /var/lib/aide/aide.db.new.gz
11 in a secure location, e.g. on separate read-only media (such as
12 CD-ROM). Alternatively, keep MD5 fingerprints or GPG signatures
13 of those files in a secure location, so you have means to verify
14 that nobody modified those files.
15
16 4) Copy /var/lib/aide/aide.db.new.gz to /var/lib/aide/aide.db.gz
17 which is the location of the input database.
18
19 5) Run "/usr/sbin/aide --check" to check your system for inconsistencies
20 compared with the AIDE database. Prior to running a check manually,
21 ensure that the AIDE binary and database have not been modified
22 without your knowledge.
tripwire:
tripwire-2.4.1.2-11.el6.x86_64.rpm
tripwire-setup-keyfiles
vim /etc/tripwire/twpol.txt
/opt/ks.cfg -> +psmugM;
twadmin -m P -S /etc/tripwire/site.key /etc/tripwire/twpol.txt
tripwire --init
或者:
tripwire --update-policy -Z low /etc/tripwire/twpol.txt
twprint -m r -r /var/lib/tripwire/report/www.up00.com-20130828-141219.twr > /tmp/twr.txt
vim /tmp/twr.txt
tripwire --update -r /var/lib/tripwire/report/www.up00.com-20130828-141219.twr
[x] ....
7. create cfg
40
41 twadmin -m F -S /etc/tripwire/site.key /etc/tripwire/twcfg.txt
42 twadmin -m f
43
44
45 create pol:
46
47 twadmin -m P -S /etc/tripwire/site.key /etc/tripwire/twpol.txt
48 twadmin -m p
1 [root@www security3]# 1.
2 [root@www security3]#
3 [root@www security3]# tripwire-setup-keyfiles
4 [root@www security3]#
5 [root@www security3]# 2.
6 [root@www security3]# tripwire --init
7 [root@www security3]#
8 [root@www security3]# ls /var/lib/tripwire/www.up00.com.twd
9 /var/lib/tripwire/www.up00.com.twd
10 [root@www security3]#
11 [root@www security3]# 3.
12 [root@www security3]#
13 [root@www security3]# tripwire --check
14 [root@www security3]# ls /var/lib/tripwire/report/
15 [root@www security3]#
16 [root@www security3]# 4.
17 [root@www security3]#
18 [root@www security3]# update pol
19 [root@www security3]#
20 [root@www security3]# vim /etc/tripwire/twpol.txt
21 [root@www security3]# /opt/ks.cfg -> +psmugM;
22 [root@www security3]#
23 [root@www security3]# twadmin -m P /etc/tripwire/twpol.txt
24 [root@www security3]# tripwire --init
25 [root@www security3]# or: tripwire --update-policy -Z low /etc/tripwire/twpol.txt
26 [root@www security3]#
27 [root@www security3]# 5.
28 [root@www security3]#
29 [root@www security3]# twprint -m r -r /var/lib/tripwire/report/www.up00.com-20130828-141219.twr > /tmp/twr.txt
30 [root@www security3]#
31 [root@www security3]# vim /tmp/twr.txt
32 [root@www security3]#
33 [root@www security3]# 6.
34 [root@www security3]#
35 [root@www security3]# tripwire --update -r /var/lib/tripwire/report/www.up00.com-20130828-141219.twr
36 [root@www security3]#
37 [root@www security3]# [x] ....
38
39 7. create cfg
40
41 twadmin -m F -S /etc/tripwire/site.key /etc/tripwire/twcfg.txt
42 twadmin -m f
43
44
45 create pol:
46
47 twadmin -m P -S /etc/tripwire/site.key /etc/tripwire/twpol.txt
48 twadmin -m p
48,1 Bot
13,1 Top