Computer Security - Unix Security - Lec II
Computer Security - Unix Security - Lec II
◼ Option 02: Verify Package Integrity Using RPM using below command on RHEL 7 or
CentOS 7. This helps system administrators to detect if package files were changed,
which could indicate that a valid binary was overwritten with a trojaned binary.
# rpm -qVa | awk '$2 != "c" { print $0}'
If any output shows up, you may have an integrity issue with that package
◼ The SysV init runlevel system provides a standard process for controlling which
programs init launches or halts when initializing a runlevel.
◼ The configuration files for SysV init are located in the /etc/rc.d/ directory.
◼ Within this directory, are the rc, rc.local, rc.sysinit, and, optionally, the
rc.serial scripts as well as the following directories: init.d/ rc0.d/ rc1.d/
rc2.d/ rc3.d/ rc4.d/ rc5.d/ rc6.d/
◼ Each of the numbered directories represent the six runlevels configured by default
◼ Install OpenSSL:
◼ OS do not ship with any SSL libraries, install OpenSSL
◼ OpenSSL suite is a set of encryption libraries and applications to make limited use
◼ Apache uses OpenSSL to serve https web pages
◼ OpenSSH uses OpenSSL as the foundation
◼ Many of the unsecured protocols, such as Telnet, FTP, and the r* commands
(rsh, rexec, rlogin, etc.), can be replaced with OpenSSH
◼ The 12 bit number above can be divided into four octal numbers which denote
special, user, group and other classes.
◼ The table below shows the octal value of each permission.
◼ Now user A calls you and informs you that he is having a problem with something in
his home directory. You, as root, cd to his directory and run ls -l to take a look
around. Suddenly, unknowingly to you, user A now has a shell he can run to gain
root permissions!
◼ Situations like these happen frequently but are easy to avoid. If “.” was not in your
path