Real easy:

/etc/tripwire/twinstall.sh

It asks several password designations...make 'em long and with
punctuation/spaces/etc....and then is done.

Finally, find your tripwire binary and do ./tripwire --init

That should do what you need.

Jerald


On Fri, 2001-09-07 at 08:35, john beamon wrote:
> There's a post that will probably make it around every linux/oss news site
> within a few hours about a Linux trojan.  I read the original at the link
> below, and it's a nice piece of work.  This trojan can infect Linux ELF
> binaries, adding about 2700 bytes of its own code.  It doesn't affect the
> function of the program it infects, but it does change the modified dates
> and size, which can be spotted by tripwire.
> 
> The trojan contacts 212.15.64.41:80 with an HTTP GET request, which can be
> spotted by a firewall or web proxy.  Upon receipt of the http request, the
> remote site can make requests back to the trojan for a remote shell
> access.  If the infected program is run by a privileged user or, worse, a
> scheduled SUID program, the remote shell has their privileges.  n an
> infected system, the backdoor process creates a lockfile
> /tmp/982235016-gtkrc-429249277. The presence of this lockfile is an
> indication for a potential infection with Remote Shell Trojan.
> 
> http://www.qualys.com/alert/remoteshell.html
> 
> This has the potential to be worse than the Lion worm, but it's also
> identifiable by tripwire and some log monitoring.  I think this would make
> an excellent topic for a LUG, especially while it's fresh.  I haven't done
> tripwire, <blush>but I've skipped over countless magazine articles about
> how to set it up</blush>.  Is there a tripwire guru in the house who'd
> like to tackle it for us?
> 


================================================
BRLUG - The Baton Rouge Linux User Group
Visit http://www.brlug.net for more information.
Send email to [EMAIL PROTECTED] to change
your subscription information.
================================================

Reply via email to