Security Issues
What
are the most files to be invaded?
1. An intruder usually tries to change or replace the following system binaries and files:
/.rhosts
/bin/.rhosts
/etc/hosts.equiv
/etc/passwd
/etc/group
/var/yp/ (nis maps)
root environment files(.login, .cahrc, .profile, .forward)
/bin/login
/bin/ls
/bin/ps
/bin/df
/user/etc/in.ftpd
/usr/etc/in.tftpd /usr/etc/in.telnetd
/usr/sbin/ifconfig
/usr/lib/libc.a
/usr/usc/cc
/usr/ucb/netstat
2. Where do the intruders often hide their files:
The intruders often
hide their files using hidden directories in the following:
/tmp
/var/tmp /etc/tmp
/usr/spool /usr/lib/cron
Where
to get the public domain security tools?
some known ftp-sites:
ftp://ftp.cert.org/pub/tools/
ftp://coast.cs.purdue.edu/pub/tools/
ftp://ftp.win.tue.nl/pub/security/
ftp://ftp.funet.fi/pub/unix/security/