Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What if I delete Tripwire for Servers keys, and then replace policy, config and database files with my own signed versions that tell Tripwire software to check nothing?

0
Posted

What if I delete Tripwire for Servers keys, and then replace policy, config and database files with my own signed versions that tell Tripwire software to check nothing?

0

Each Tripwire for Servers report details when the database was last updated, providing a quick benchmark detailing if or when the data files have been replaced. In order to replace these files, an attacker requires root or administrator level privileges and must know where Tripwire for Servers has been installed. On a properly secured system, gaining this level of access takes time and leaves physical evidence behind for Tripwire for Servers to detect prior to the system being compromised. Methods for reducing the risk of an intruder being able to replace a Tripwire for Servers installation include: • Hiding the application by renaming configuration, data, and binary files and installing to a hidden location. • Installing Tripwire for Servers to a read-only partition such as a CD-ROM.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123