Security Issues


What are the most files to be invaded?

    1.  An intruder usually tries to change or replace the following system binaries and files:

         /.rhosts            /bin/.rhosts           /etc/hosts.equiv          /etc/passwd            /etc/group
        /var/yp/ (nis maps)              root environment files(.login, .cahrc, .profile, .forward)

        /bin/login                /bin/ls                      /bin/ps                      /bin/df
        /user/etc/in.ftpd      /usr/etc/in.tftpd        /usr/etc/in.telnetd       /usr/sbin/ifconfig
        /usr/lib/libc.a          /usr/usc/cc               /usr/ucb/netstat

    2. Where do the intruders often hide their files:

        The intruders often hide their files using hidden directories in the following:
         /tmp         /var/tmp        /etc/tmp        /usr/spool        /usr/lib/cron
 
 

Where to get the public domain security tools?

        some known ftp-sites:

          ftp://ftp.cert.org/pub/tools/
           ftp://coast.cs.purdue.edu/pub/tools/
          ftp://ftp.win.tue.nl/pub/security/
           ftp://ftp.funet.fi/pub/unix/security/