Stealth V. 2.02.01
Frank B. Brokken
Center for Information Technology, University of Groningen
2005-2011
Table of Contents
- 1.2.1: The integrity of the stealth distribution
- 3.3.1: LABEL commands
- 3.3.2: LOCAL commands
- 3.3.3: REMOTE commands
- 3.3.4: Preventing Controller Denial of Service (--max-size)
- 4.0.1: The controller's user: creating an ssh-key
- 4.0.2: The client's account: accepting ssh from the controller's user
- 4.0.3: Logging into the account@client account
- 4.0.4: Using the proper shell
- 5.2.1: the DEFINE directives
- 5.2.2: the USE directives
- 5.2.3: the commands
- 5.2.3.1: Obtain the client's sha1sum program
- 5.2.3.2: Check the integrity of the client's sha1sum program
- 5.2.3.3: Check the client's /usr/bin/find command
- 5.2.3.4: Check the client's setuid/setgid files
- 5.2.3.5: Check the configuration files in the client's /etc/ directory
- 5.2.4: The complete `policy' file
- 5.3.1: The mailed report
- 5.3.2: Files under /root/stealth/client
- 5.4.1: All files unaltered
- 5.4.2: Modifications have occurred
- 5.5.1: Skipping (some) integrity checks
- 5.7.1: Status file cleanup
- 5.7.2: Using `logrotate' to control report- and status files