Linux 下手动查杀木马过程 您所在的位置:网站首页 如何查找木马病毒文件 Linux 下手动查杀木马过程

Linux 下手动查杀木马过程

2024-06-29 11:31| 来源: 网络整理| 查看: 265

配置 Tripwire 这一步使用密码为 Tripwire 生成一个站点(site)密钥和一个本地(local)密钥。这可以帮助保护Tripwire 免受未经授权的访问。本地密钥用于数据库文件,站点密钥用于配置文件和策略文件。您需要记住自己给出的密码,因为您更新策略文件或数据库时需要输入这些密码。下面的命令生成密钥: # tripwire-setup-keyfiles      #密码都是 123456

---------------------------------------------- The Tripwire site and local passphrases are used to sign a  variety  of files, such as the configuration, policy, and database files.

Passphrases should be at least 8 characters in length and contain  both letters and numbers.

See the Tripwire manual for more information.

---------------------------------------------- Creating key files...

(When selecting a passphrase, keep in mind that good passphrases typically have upper and lower case letters, digits and punctuation marks, and are at least 8 characters in length.)

Enter the site keyfile passphrase: Verify the site keyfile passphrase: Generating key (this may take several minutes)...Key generation complete.

(When selecting a passphrase, keep in mind that good passphrases typically have upper and lower case letters, digits and punctuation marks, and are at least 8 characters in length.)

Enter the local keyfile passphrase: Verify the local keyfile passphrase: Generating key (this may take several minutes)...Key generation complete.

---------------------------------------------- Signing configuration file...Please enter your site passphrase: Wrote configuration file: /etc/tripwire/tw.cfg

A clear-text version of the Tripwire configuration file:/etc/tripwire/twcfg.txt has been preserved for your inspection.  It  is  recommended  that  you move this file to a secure location and/or encrypt it in place (using a tool such as GPG, for example) after you have examined it.

---------------------------------------------- Signing policy file...Please enter your site passphrase: Wrote policy file: /etc/tripwire/tw.pol

A clear-text version of the Tripwire policy file: /etc/tripwire/twpol.txt has been preserved for  your  inspection.  This  implements  a  minimal policy, intended only to test  essential  Tripwire  functionality.  You should edit the policy file to  describe  your  system,  and  then  use twadmin to generate a new signed copy of the Tripwire policy.

Once you have a satisfactory Tripwire policy file, you should move  the clear-text version to a secure location  and/or  encrypt  it  in  place (using a tool such as GPG, for example).

Now run "tripwire --init" to enter Database Initialization  Mode.  This reads the policy file, generates a database based on its contents,  and then cryptographically signs the resulting  database.  Options  can  be entered on the command line to specify which policy, configuration, and key files are used  to  create  the  database.  The  filename  for  the database can be specified as well. If no  options  are  specified,  thedefault values from the current configuration file are used.

 tripwire --init                     #初始化数据库:生成基准数据库 Wrote database file: /var/lib/tripwire/c7_2_40.twd    # 存储数据的路径及文件名 The database was successfully generated.  

配置 Tripwire 策略 # vim /etc/tripwire/twpol.txt #一般不需要修改,默认就可以了



【本文地址】

公司简介

联系我们

今日新闻

    推荐新闻

    专题文章
      CopyRight 2018-2019 实验室设备网 版权所有