Blackhole
Chris Kenward
kenwardc at tgis.co.uk
Mon Apr 11 18:19:43 UTC 2005
Hi Reuben
> 2. Run several rootkit detection. Rookit hunter (http://www.rootkit.nl/)
> and chkrootkit (http://www.chkrootkit.org/) are two commons program for
> rootkit detection.
Have now used therootkit as well... Impressive!! This is one of the items it
came up with... How do I change SSH so that access directly as root is NOT
allowed?
* Check: SSH
Searching for sshd_config...
Found /etc/ssh/sshd_config
Checking for allowed root login...
Watch out Root login possible. Possible risk!
Regards
Chris
More information about the redhat-list
mailing list