LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 02-14-2009, 06:58 AM   #1
24653
LQ Newbie
 
Registered: Jan 2009
Posts: 10

Rep: Reputation: 0
Question software for monitoring use of peripherals in a LAN


hello there,
i'm working on a project pertaining to disabling of USB periherals in stand alone LANs where the server PC is on linux OS and client PCs are either windows or linux based OS.
Is it possible to run a trojan program on client PCs by command of the server PC i.e i have a trojan program whose purpose is to run on the cilent PCs and keep intimating the server PC as to which client PC has just accessed its USB peripheral and for what purpose eg USB mouse,USB mass storage devices etc. This way the server PC can monitor all the clients and whenever any client PC accesses its USB then a pop up comes on the screen of server PC giving the IP address of the PC using the USB and type of peripheral used.
other requirements are:
1. Where can i get such a trojan for the task as mentioned above.Are there any sites where i can get the program codes for such a program?
2. Will such a trojan run on LINUX and windows OS?

Thanx
 
Old 02-14-2009, 07:10 AM   #2
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
reported to mods ... I have a feeling requesting a trojan is illegal, no matter what purpose you say you have for it.
 
Old 02-14-2009, 07:53 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
If you substitute "monitoring" for "trojan" then yes, it should be possible to monitor a GNU/Linux host for accessing peripherals and send logging to a remote syslog server for further processing. For instance USB mass storage devices are represented as SCSI block devices, see an example using HAL: http://www.linuxquestions.org/questi...b-port-692836/. As far as the mcrsft side of things is concerned I don't know and I don't want to know and I'm just not interested in that. If the OP actually meant to use a trojan this thread should indeed be dealt with.
 
Old 02-14-2009, 12:23 PM   #4
frieza
Senior Member
 
Registered: Feb 2002
Location: harvard, il
Distribution: Ubuntu 11.4,DD-WRT micro plus ssh,lfs-6.6,Fedora 15,Fedora 16
Posts: 3,233

Rep: Reputation: 406Reputation: 406Reputation: 406Reputation: 406Reputation: 406
if you dont want usb at all and you have physical sccess to the machine it might be just eaiser to turn off the usb ports in the machine's bios depending on the bios and password protect bios setup.
but if thats not what you want then yes, linux does keep logs of events as unspawn mentioned and it would be easy with the right program to monitor those events and notfy a program on the server or send an email to an administrator, depending on the purpose of why you are doing this
as mentioned above, trojan implies illicit monitoring whereas there are legitimate uses for such programs, such as in a workplace that forbids use of usb mass storage devices, monitoring for employees who violate said rule.

Last edited by frieza; 02-14-2009 at 12:28 PM.
 
Old 02-14-2009, 10:13 PM   #5
24653
LQ Newbie
 
Registered: Jan 2009
Posts: 10

Original Poster
Rep: Reputation: 0
thanx for your replies.......
i was not aware of a trojan requisition being illegal. However, i have my self reported this to the moderator and requested him to delete this thread. I think i have made a mistake of using the word trojan.
 
Old 02-14-2009, 10:24 PM   #6
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682
Look at PolicyKit for controlling whether a user on a Linux host is permitted to mount a usb device. If you unload kernel modules that are used with usb, you might also disable other usb devices. You could also create udevinfo rules that trigger on the the UUID of an external device, allowing only certain external drives (such as a backup drive) to have nodes created.

Last edited by jschiwal; 02-14-2009 at 10:48 PM.
 
Old 02-15-2009, 04:24 AM   #7
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
Quote:
Originally Posted by 24653 View Post
I think i have made a mistake of using the word trojan.
I agree, if you want a monitoring app, say you want a monitoring app, not a trojan.

Quote:
In the context of computing and software, the term Trojan horse, also known as a trojan, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse.
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
 
Old 02-15-2009, 04:33 AM   #8
reddazz
LQ Guru
 
Registered: Nov 2003
Location: N. E. England
Distribution: Fedora, CentOS, Debian
Posts: 16,298

Rep: Reputation: 77
Quote:
Originally Posted by 24653 View Post
thanx for your replies.......
i was not aware of a trojan requisition being illegal. However, i have my self reported this to the moderator and requested him to delete this thread. I think i have made a mistake of using the word trojan.
I've edited the title of your thread. I'll leave the thread open for now because it does not appear that you are looking for help to do something illegal.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
trojan for monitoring use of peripherals in a LAN 24653 Linux - Server 1 02-14-2009 07:32 AM
Any app for monitoring LAN? csvke Linux - Networking 1 05-07-2004 11:46 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 11:50 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration