Chirpy

Chirpy

New RootKit Hunter v1.3.2

The Rootkit Hunter project team announces release 1.3.2.The changelog lists 3 additions, 6 changes and 14 bugfixes. Naming a few:- Socklog and rsyslog daemons support.- IRIX/IRIX64 support.- Application version check errors mostly ignored.- Unset ALLOW_SSH_ROOT_USER and ALLOW_SSH_PROT_V1.- Application check whitelisting.-…

New csf v3.11

Changes: Use /proc for Process Tracking instead of ps output incase of exploited system binaries and to better determine resource usage of each process

RedHat v5 Kernel Release

Looks like there is very important kernel upgrade that you should perform if you’re running RHEv5 (and presumably CentOSv5 when it’s released) which allows non-priv root escalation:

New csf v3.10

Changes: Modified INPUT and OUTPUT chain rules to always specify the ethernet device csf now re-applies temporary IP blocks on restart Added new CLI command to add temporary IP bans. See csf -h for the new csf -td command Added…

New csf v3.09

Changes: Fixed missing copy for the portscan.txt report for generic installations Added new option PS_EMAIL_ALERT to enable/disable Port Scan Tracking email alerts Added a sample of the port blocks that trigger the Port Scan to the report. This new report…

New csf v3.08

Changes: Modified Port Scan Tracking to ignore blocked IP addresses incase DROP_IP_LOGGING is enabled

New csf v3.07

Changes: Added Apache Server Status report to PT_LOAD for load average report monitoring. To benefit from this feature you will need to rename the new report file to loadalert.txt. The reports (ps, vmstat and apache) are now included as…

New csf v3.06

Changes: Added System Exploit Checking. This enables lfd to check for the Random JS Toolkit and may check for others in the future: compares md5sums of the binaries listed in the exploit above for changes and also attempts to create…

New csf v3.05

Changes: Added perl regex checking to csf.pignore with the new options puser, pexe and pcmd. Text added to csf.pignore for new installations: # Or, perl regular expression matching (regex):## pexe:/full/path/to/file as a perl regex[*]# puser:username as a perl regex[*]# pcmd:command…