I'm no expert.
I run chkrootkit on a regular basis.
Run a virus scanner it will find some exploits.
Hacafee found a few rootkits and known kernel exploits.
I use mcafee for linux.
Analyze history files for certain keywords.
The best way would be to analyze command frequency in history files and
loo
I'm no expert.
I run chkrootkit on a regular basis.
Run a virus scanner it will find some exploits.
Hacafee found a few rootkits and known kernel exploits.
I use mcafee for linux.
Analyze history files for certain keywords.
The best way would be to analyze command frequency in history files and
loo
>
> One of my hats is a junior sys admin in an academic environment. I'm
> curious as to how you know when shell users are trying to exploit a
kernel
> hole.
chkrootkit?
> I have at most a week from a known kernel exploit to when one of my users
> tries to exploit via shell access.
One of my hats is a junior sys admin in an academic environment. I'm
curious as to how you know when shell users are trying to exploit a kernel
hole.
In another non academic environme
>
> One of my hats is a junior sys admin in an academic environment. I'm
> curious as to how you know when shell users are trying to exploit a
kernel
> hole.
chkrootkit?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> I have at most a week from a known kernel exploit to when one of my users
> tries to exploit via shell access.
One of my hats is a junior sys admin in an academic environment. I'm
curious as to how you know when shell users are trying to exploit a kernel
hole.
In another non academic environme
6 matches
Mail list logo