22. MD5 and Fingerprint Database

A simple and powerful way to determine if executable binaries or scripts, or libraries have been trojanned is to maintain and use a MD5 checksum database. Several popular utilities are available which implement this idea including Tripwire (commercial software), AIDE and Cheesewire; inode values can also be usefully stored.

Usage is simple: update the database each time the system is patched; copy the database to a remote, secure location (or burn to CD-R); periodically compare MD5 values (and inode values) of installed files to those in the database — or check after a suspected intrusion. Differences from the database indicate trojanned files. For most reliable results, mount the suspect filesystem as slave after booting from clean media.

...previousup (conts)next...



About this document:

Produced from the SGML: /home/umits/public_html/_unix_security/_reml_grp/diagnostic_forensic_tools.reml
On: 23/10/2005 at 13:29:12
Options: reml2 -i noindex -l long -o html -p multiple