, some vulnerabilities will always be discovered, although they may not be the most serious and the most influential. This situation actually proves a popular theory: any resource or service project exposed to the public should be considered as a potential security risk and should be monitored closely. This is exactly what security audit will do next: Check logs and scan files.
Check logs
Check the server log file
of a privilege means that an administrator chooses a specific access operation to obtain a minimal audit record. Simply put, "the resulting audit records are minimal and can cover the security needs of users" is easier to achieve. Because in the actual work, often only need to audit specific operations. If only the user chan
2011-09-27 22:11:51| Category: rhel5_033| Report | Font size Subscription Linux uses Prompt_command to realize audit functionThis system audits, records what the user, at what time, did what operation. The information is then recorded in a file.I. Configuration1. At the end of the/etc/profile file, add the following 2 lines of code:Export history_file=/var/
the rule configuration used for system invocationThere are a few things to note about configuration files:1. Directory observations are less detailed than file observations.2. Cannot use any of the pathname globbing, such as? Or3. Only existing files can be configured, and if you configure the Watch directory and add files, the new files will only be added after the next audit restart.Using-K to generate a
popular and advanced vulnerability scanning tool, you can still try other options, such as Nmap, although it is generally only a port scanner, it cannot be completely called a vulnerability scanner; Metasploit is powerful but complicated to use, expensive to use; or BackTrAck Linux is a collection of released Linux penetration testing tools. no matter which tool you choose or how to deploy your own penetra
Today a brother's library ora-09925:unable to create audit trail file, then check df-h have free space, directory permissions are correct, not df-i view inodes use, Audit directory has nearly 24W files, Preliminary guess is because the audit generated too many files caused the directory is the partition of the inodes r
vulnerabilities will always be discovered, although they may not be the most serious and have the worst impact. this situation actually proves a popular theory: any resource or service project exposed to the public should be considered as a potential security risk and should be monitored closely. this is exactly what security audit will do next: Check logs and scan files.Check logsCheck the server log file
Background:Linux operating system If you find a process is not known to be killed and do not know which process was killed, if we do not know can beConfiguration:1). Root log in and open the Audit.rules file, located under the/etc/audit/folder.Add the following content:-A always,exit-f arch=b64-s kill-k *wg934*Note: If the bad border is 32, please change to-f arch=b32*wg934* just behind the mark, the aspect
1. Logon account management
In Linux, you can use utmp and wtmp to manage user accounts. Wtmp also records information about system restart and system status changes. All data related to utmp and wtmp are stored in the/var/run/utmp and/var/log/wtmp files respectively. Both files belong to the root user and have 644 access permissions. The data in these files is encrypted. You can use the dump-utmp tool to c
Original address: http://www.sudu.cn/info/index.php? OP = article id = 17049
1. Logon account management
In Linux, you can use utmp and wtmp to manage user accounts. Wtmp also records information about system restart and system status changes. All data related to utmp and wtmp are stored in the/var/run/utmp and/var/log/wtmp files respectively. Both files belong to the root user and have 644 access permissi
In Red Hat Enterprise Edition Linux5, how does one use audit to check who modified the file? -- Linux general technology-Linux technology and application information. For details, refer to the following section. When we create a security policy for a server, it is necessary to check whether the
I. OverviewPrevious (Understanding Linux Audit Service.) We mainly analyze the structure of Audit services, the configuration of Audit services, and how to read the meanings represented by the Audit log. This article mainly describes how to use the three tools provided by
1. Login account Management
The management of login user accounts under Linux is achieved through the utmp and wtmp tools. WTMP also records information about system reboots and system state changes. All data related to UTMP and wtmp are stored in the two files/var/run/utmp and/var/log/wtmp respectively. All two files are owned by the root user and access is set to 644, and the data in these files is encryp
' attribute, it is regarded as the top directory of the directory structure for Orlov block allocation.
U
Files can be deleted in reverse mode. The opposite is S!
X (suppressing underlying access)
Mark direct access to files
Z (Suppress dirty files)
Mark dirty files
Lsattr
Chattr
User:
Useradd
Usermod
Usedel
Passwd
Adduser
Deluser
Pwck
Pwconv
Pwuncov
ID
Whoami
Who am I
Who
Finger
Chfn
CHSH
/E
Use rsyslog to audit Linux Users
Rsyslog is part of the standard Linux system. It can write logs in real time and selectively Send Logs to remote log servers.
The dependency on. bash_history or script to audit the commands executed by the user is unreliable. Although both of them record user behavior, they may be tampe
Lynis is an open-source system security Audit Utility tool that consists of a series of shell scripts that form a comprehensive security-check tool for systems, accounts, processes, and other levels of security risks and are listed in an intuitive way Support the current mainstream Linux platform.First, the Lynis inspection project is generally as followsWhether the system program has been replaced or tampe
Article Title: Audit and tracking Linux user activities. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Some abnormal users try to migrate all activity records on the system (for e
In the Rhel7centos7 era, the default service is controlled by SYSTEMD and the Systemctl command completes the start and stop. But not all services can be perfectly controlled by systemctl, such as the AUDITD to be mentioned today.Edit audit.rules after adding rules, of course, through the restart service to restart the effect, but bySystemctl Restart AUDITDThe following error will be reported:[Email protected]]# systemctl Restart auditdfailed to restart Auditd.service:Operation refused, unit Aud
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.