Forfatterarkiv: mike

FreeBSD – Install/Update ports/Cvsup

If no ports at all: pkg_add -r cvsup-without-gui cd /usr/ports/net/cvsup-without-gui make make install rehash cd /usr/share/examples/cvsup vi ports-supfile ————————————– # listed at http://www.freebsd.org/handbook/mirrors.html. *default host=CHANGE_THIS.FreeBSD.org *default base=/usr ————————————- Change to: ————————————– # listed at http://www.freebsd.org/handbook/mirrors.html. *default host=cvsup.dk.FreeBSD.org *default base=/usr ————————————- … Læs resten

Udgivet i FreeBSD, Knowledge Base, Old Base | Skriv en kommentar

FreeBSD : Install Webserver (ftp,http,php)

# apache wants openssl cd /usr/ports/security/openssl make install # and expat2 cd /usr/ports/textproc/expat2 make deinstall make install cd /usr/ports/www/apache2 make install echo apache2_enable=YES >> /etc/rc.conf cd /usr/ports/www/mod_php4 make install – ncurses menu will come up, select wanted modules echo AddType … Læs resten

Udgivet i FreeBSD, Knowledge Base, Old Base | Skriv en kommentar

Scan for rootkit

Use chkrootkit to determine the extent of a compromise. If you suspect that you have a compromised system, it is a good idea to check for root kits that the intruder may have installed. In short, a root kit is … Læs resten

Udgivet i Knowledge Base, Linux, Old Base | Skriv en kommentar

Finding compromised packages with RPM

Verify operating system installed files in an RPM-based distribution. So you’ve had a compromise and need to figure out which files (if any) were modified by the intruder, but you didn’t install Tripwire? Well, all is not lost if your … Læs resten

Udgivet i Knowledge Base, Linux, Old Base | Skriv en kommentar

Verify file integrity and find compromised files

Use Tripwire to alert you to compromised files or verify file integrity in the event of a compromise. One tool that can help you detect intrusions on a host and also ascertain what happened after the fact is Tripwire (http://sourceforge.net/projects/tripwire). … Læs resten

Udgivet i Knowledge Base, Linux, Old Base | Skriv en kommentar

Forensics: Create an image of the entire harddisk

Make a bit-for-bit copy of your system’s disk for forensic analysis. Before you format and reinstall the operating system on a recently compromised machine, you should take the time to make duplicates of all the data stored on the system. … Læs resten

Udgivet i Knowledge Base, Linux, Old Base | Skriv en kommentar

Record honeypot activity

Keep track of everything that happens on your honeypot. Once an attacker has fallen prey to your honeypot and gained access to it, it is critical that you monitor all activity on that machine. By monitoring every tiny bit of … Læs resten

Udgivet i Knowledge Base, Networking, Old Base, Security | Skriv en kommentar

Using honneyd

Use honeyd to fool would-be attackers into chasing ghosts. As the saying goes, you will attract more flies with honey than with vinegar. (I’ve never understood that saying; who wants to attract flies, anyway?) A honeypot is used to attract … Læs resten

Udgivet i Knowledge Base, Networking, Old Base | Skriv en kommentar

Apache IDS

Protect your web server and dynamic content from intrusions. Detecting intrusions that utilize common protocols and services is a job that a network intrusion detection system is well suited for. However, due to the complexity of web applications and the … Læs resten

Udgivet i Apache, Knowledge Base, Networking, Old Base | Skriv en kommentar

Optimizing snort for high performance / Database

Decouple Snort’s output stage so it can keep pace with the packets. Snort by itself is fine for monitoring small networks or networks with low amounts of traffic, but it does not scale very well without some additional help. The … Læs resten

Udgivet i Knowledge Base, Linux, Networking, Old Base | Skriv en kommentar