LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-15-2018, 10:29 AM   #1
Quirinus
LQ Newbie
 
Registered: Feb 2018
Posts: 3

Rep: Reputation: Disabled
Most critical files that must be monitoring on Linux in terms of security


Hi.
It's maybe the most shit question ever that I generated.
I mean any critical points of Linux, any files, or directory that must be monitoring to detect any suspicious activity.

For example:

/tmp
because many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack

/etc/passwd or /etc/shadow
because, sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date.

/etc/services
Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines

crontab or /etc/init.d
It's good to detect any persistence

So, what about else? Of course I missed many and would be happy if you helped
 
Old 03-15-2018, 10:42 AM   #2
sag47
Senior Member
 
Registered: Sep 2009
Location: Raleigh, NC
Distribution: Ubuntu, PopOS, Raspbian
Posts: 1,899
Blog Entries: 36

Rep: Reputation: 477Reputation: 477Reputation: 477Reputation: 477Reputation: 477
It depends on the purpose of the system. For example, if it has SSH running, then I would be monitoring /var/log/secure (or /var/log/auth.log) and alerting on brute force events. You could also have alerting on certain firewall logs. Example, when heartbleed came out, after patching I would set up log monitors for addresses attempting to exploit it.

Security is ongoing so I tend to read about what other people are doing and even explore some of my own original ideas to address challenges.
 
Old 03-15-2018, 06:52 PM   #3
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,668
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
I think that the single most-important thing to do is: do not directly expose ssh. There's nothing "secure" about the fact that it is a shell.

Your outer bastion of defense should be OpenVPN with one-of-a-kind digital certificates and tls-auth, as I describe on my blog here. Use this to create a secret(!) outer door, and arrange for SSH and all other services (other than, perhaps, http(s)) to listen only to its gateway port. Use firewalls to make damn sure they can't talk directly or be talked-to.

Once you do that, something very dramatic happens: the number of unauthorized access attempts drops to zero and stays there. Anyone who "port scans" your computer, even suspecting that you're running OpenVPN there, will perceive that nothing's there. You can't attack a computer if you can't find it.

Last edited by sundialsvcs; 03-15-2018 at 06:54 PM.
 
Old 03-15-2018, 06:58 PM   #4
ChuangTzu
Senior Member
 
Registered: May 2015
Location: Where ever needed
Distribution: Slackware/Salix while testing others
Posts: 1,718

Rep: Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857
sniff, sniff sniff...smells like homework to me.....

Although, if not it could turn into a good sticky
 
Old 03-16-2018, 08:06 AM   #5
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
https://www.linuxquestions.org/quest...erences-45261/
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: http://www.zdnet.com/article/critical-linux-security-hole-found/ LXer Syndicated Linux News 0 01-27-2015 05:21 PM
Unix/Linux Bash: Critical security hole uncovered jeremy Linux - News 0 09-25-2014 12:42 PM
LXer: Unix/Linux Bash: Critical security hole uncovered LXer Syndicated Linux News 0 09-25-2014 02:01 AM
In terms of security and spam control smf or phpbb? enyawix Linux - Security 1 05-30-2011 06:24 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:26 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration