<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security script in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458697#M13331</link>
    <description>Thanks Paula</description>
    <pubDate>Tue, 31 Oct 2000 18:07:38 GMT</pubDate>
    <dc:creator>Paulo Afonso Bruno</dc:creator>
    <dc:date>2000-10-31T18:07:38Z</dc:date>
    <item>
      <title>security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458687#M13321</link>
      <description>Hi to all.&lt;BR /&gt;&lt;BR /&gt;I am looking at writing a script that will on being run FTP copies of system log files to another server. So that in the event of a security problem I can concentrate on fixing and bring the attacked sever back on line and then later do an offline investigation.&lt;BR /&gt;&lt;BR /&gt;Well guys/gals what are your thoughts on this?  &lt;BR /&gt;&lt;BR /&gt;Is it feasible to set up a list of all the files that may show an intruders footsteps? &lt;BR /&gt;&lt;BR /&gt;And if so which file do you include - some are very obvious (wtmp,btmp,syslog etc)but what are the less obvious?&lt;BR /&gt;&lt;BR /&gt;Awaiting your ideas- &lt;BR /&gt;Paula&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Oct 2000 10:26:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458687#M13321</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2000-10-27T10:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458688#M13322</link>
      <description>You can use /var/adm.inetd.sec to restrict access to your system. It provides additional security.&lt;BR /&gt;Also check /var/adm/sulog.</description>
      <pubDate>Fri, 27 Oct 2000 11:06:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458688#M13322</guid>
      <dc:creator>CHRIS_ANORUO</dc:creator>
      <dc:date>2000-10-27T11:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458689#M13323</link>
      <description>Hi Paula,&lt;BR /&gt;Your problem will be as follows:&lt;BR /&gt;If someone gets into the system, he/she will always try to wipe their prints. So depending on what level of access they get to you system will basically determine how well they can wipe their prints. Most damaging obviously being root.&lt;BR /&gt;&lt;BR /&gt;Besides they few obvious ones like wtmp,btmp,etc you should consider copieng some of these files as well:&lt;BR /&gt;passwd&lt;BR /&gt;shell history commands&lt;BR /&gt;acct files&lt;BR /&gt;crontab - yes nice way to reinstate access&lt;BR /&gt;syslog&lt;BR /&gt;maillog&lt;BR /&gt;nettlogs&lt;BR /&gt;&lt;BR /&gt;This list might vary a lot depending on the setup of your system&lt;BR /&gt;Like: is accounting enabled?&lt;BR /&gt;are you running a secure system ?&lt;BR /&gt;etc&lt;BR /&gt;&lt;BR /&gt;Hope you find some info to be usefull.&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Oct 2000 11:40:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458689#M13323</guid>
      <dc:creator>Ossie de Jongh</dc:creator>
      <dc:date>2000-10-27T11:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458690#M13324</link>
      <description>Hi and thanks to Chris and Ossie so far.&lt;BR /&gt;-  points will be awarded.&lt;BR /&gt;&lt;BR /&gt;The list so far is:-&lt;BR /&gt;&lt;BR /&gt;1. wtmp&lt;BR /&gt;2. btmp&lt;BR /&gt;3. utmp&lt;BR /&gt;4. utmpx&lt;BR /&gt;5. syslog.log&lt;BR /&gt;6. passwd&lt;BR /&gt;7. groups&lt;BR /&gt;8. shell history&lt;BR /&gt;9. mail.log&lt;BR /&gt;10. netlogs&lt;BR /&gt;11. sulog&lt;BR /&gt;12. inetd.sec&lt;BR /&gt;13. crontab&lt;BR /&gt;&lt;BR /&gt;Now the list is mainly log files, how about.&lt;BR /&gt;&lt;BR /&gt;ll ?R |grep ?ATTACK_DATE? &amp;gt;attacked &lt;BR /&gt;&lt;BR /&gt;and this file included in the routine?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Oct 2000 14:01:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458690#M13324</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2000-10-27T14:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458691#M13325</link>
      <description>There is a SW app called Tripwire that will keep tabs on what has been modified. You can configure the files it is to watch and it can tell you if changes have occurred.&lt;BR /&gt;&lt;BR /&gt;Can be obtained from the COAST security site.</description>
      <pubDate>Fri, 27 Oct 2000 14:18:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458691#M13325</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2000-10-27T14:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458692#M13326</link>
      <description>Thanks Chris Ossie and Nick,&lt;BR /&gt;&lt;BR /&gt;Points have been awarded.&lt;BR /&gt;&lt;BR /&gt;Best wishes &lt;BR /&gt;Paula</description>
      <pubDate>Tue, 31 Oct 2000 08:54:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458692#M13326</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2000-10-31T08:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458693#M13327</link>
      <description>Rick &lt;BR /&gt;&lt;BR /&gt;do you know what is internet address this sw ( SW Tripwire ) ? &lt;BR /&gt;&lt;BR /&gt;thank?s &lt;BR /&gt;Paulo</description>
      <pubDate>Tue, 31 Oct 2000 17:51:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458693#M13327</guid>
      <dc:creator>Paulo Afonso Bruno</dc:creator>
      <dc:date>2000-10-31T17:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458694#M13328</link>
      <description>Rick &lt;BR /&gt;&lt;BR /&gt;do you know what is internet address this sw ( SW Tripwire ) ? &lt;BR /&gt;&lt;BR /&gt;thank?s &lt;BR /&gt;Paulo</description>
      <pubDate>Tue, 31 Oct 2000 17:51:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458694#M13328</guid>
      <dc:creator>Paulo Afonso Bruno</dc:creator>
      <dc:date>2000-10-31T17:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458695#M13329</link>
      <description>Rick &lt;BR /&gt;&lt;BR /&gt;do you know what is internet address this sw ( SW Tripwire ) ? &lt;BR /&gt;&lt;BR /&gt;thank?s &lt;BR /&gt;Paulo</description>
      <pubDate>Tue, 31 Oct 2000 17:52:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458695#M13329</guid>
      <dc:creator>Paulo Afonso Bruno</dc:creator>
      <dc:date>2000-10-31T17:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458696#M13330</link>
      <description>Hi&lt;BR /&gt;Address for tripwire is&lt;BR /&gt;&lt;A href="http://www.tripwiresecurity.com/products/" target="_blank"&gt;http://www.tripwiresecurity.com/products/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 31 Oct 2000 17:55:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458696#M13330</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2000-10-31T17:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: security script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458697#M13331</link>
      <description>Thanks Paula</description>
      <pubDate>Tue, 31 Oct 2000 18:07:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-script/m-p/2458697#M13331</guid>
      <dc:creator>Paulo Afonso Bruno</dc:creator>
      <dc:date>2000-10-31T18:07:38Z</dc:date>
    </item>
  </channel>
</rss>

