brent timothy saner via plug on 11 May 2021 17:11:08 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Simple Reliable method to determine what is running on a Linux Box |
On 5/11/21 11:56, Mark Bergman via plug wrote: > Conceptually, there is no way to do what you want. > > If someone has shell access, they can trivally obscure any program they are running. That's how malware operates, only in this case, the act of hiding a forbidden program is done > intentionally by the owner of the PC. The simplest example is: > > sudo cp /path/to/app/forbidden/during/exam /usr/bin/vi > vi Just a point of argument, this wouldn't work in SELinux with contexts applied. BUUUT of course that requires you having root access to their machine, them NOT having it[0], and running CentOS/RedHat. (Similarly, you can only whitelist specific commands for sudo, but again- you root, them not, etc.) But it *is* enforceable under those conditions. [0] "But they have physical access!" Sure, but consider this: an iPXE-booted filesystem that requires remote decryption via SSH. They can't change or bruteforce/etc. the root password (because the / fs image is encrypted), they can't mount the image (read-only, loads into RAM, and again- requires remote decryption), and at that point the only circumvention options they have available are custom rootkitted kernel/initramfs (which can be detected by runtime analysis from within the encrypted fs image post-decryption) or custom hardware-level attacks. The ROI on these for a ham license test is extremely poor, so you're probably fine. ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug