On Sat, 14 Jul 2012 12:46:50 +0000
"Ali Varshovi " <ali.varsh...@hotmail.com> wrote:

> Does anyone have any guidelines/useful material on analysis logs
> of a Linux machine to detect signs of compromise? The data
> collection piece is not a challenge as a lot of useful information
> can be captured using commands and some scripts. I'm wondering if
> there is any systematic approach to analyze the collected logs?
> Most of the materials I've seen are more aligned to malware and
> rootkit detection which is not the only concern apparently.

Hi Ali,

I'd say send log to another machine, use a "checksumator" (like
tripwire), store its computation files on an external storage 
device and when you check the system with it, boot it on a liveCD.

And as G.Baribault says, each compromised system tries to store its
findings elsewhere on the Internet (often encrypted these days), so
a fine traffic analyzer would be a good thing; but is there a very
good one working out of the box, I don't know!? (beware it can be
very disk space greedy).

JY
-- 
< Overfiend> well, excellent.  I get to tear someone a new asshole.
                -- in #debian-devel

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to