exploiting kernel

Trent McGrath trent.mcgrath at unix.net
Fri Dec 2 00:46:11 GMT 2005


http://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/security.html

/etc/rc.conf
kern_securelevel_enable="YES"
kern_securelevel="1"

and chflags(1)
http://www.freebsd.org/cgi/man.cgi?query=chflags&apropos=0&sektion=0&manpath=FreeBSD+5.4-RELEASE&format=html

Thank You,
Trent McGrath

MIT PGP Key ID: 0xECCF4586
Key fingerprint:
9A 50 CC 42 80 04 84 C0  39 2B 4C F5 FE 99 F7 6B  EC CF 45 86



iwan at staff.usd.ac.id wrote:
> I'm sorry my english makes confuse, my email mean:
> I need to know about kernel's freebsd exploiting to
> securing my box. And I need to know how hackers do that
> (and what kind of tools they used) either.
> 
> Thanks.
> 
> 
>>iwan at staff.usd.ac.id wrote:
>>
>>
>>>Hi,
>>>Can kernel's freeBSD exploited by tools hacking ? If
>>>true,
>>>can I know how to fix this problem, and what tools can do
>>>that.
>>>
>>>Thanks alot
>>>
>>>
>>>
>>>_______________________________________________
>>>freebsd-security at freebsd.org mailing list
>>>http://lists.freebsd.org/mailman/listinfo/freebsd-security
>>>To unsubscribe, send any mail to
>>>"freebsd-security-unsubscribe at freebsd.org"
>>>
>>>
>>>
>>>
>>
>>thats a bit like asking how long is a piece of string.
>>the port chkrootkit can help tell you if a root kit has
>>been installed
>>on your system, thats all i can tell you with the
>>information you gave.
>>
> 
> 
> 
> 
> _______________________________________________
> freebsd-security at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"
> 
> 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5222 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.freebsd.org/pipermail/freebsd-security/attachments/20051201/842febc2/smime.bin


More information about the freebsd-security mailing list