On Wed, Apr 02, 2008 at 10:50:59AM -0700, Dennis Peterson wrote:
> Arthur Sherman wrote:
> >> I use scripts now to monitor user space for new php code.
> > Could you share these scripts?
> 
> On a Solaris system you can use the built-in aset tool, and for any 
> Unix/Linux system you can use trip-wire or Cfengine.

Or in plain old sh:

    touch /tmp/lastscan.tmp
    find /path/to/documentroot -newer /tmp/lastscan -name \*.php
    mv /tmp/lastscan.tmp /tmp/lastscan

Bootstrapping this so it won't give an error on the first run is left as
an excersize to the reader (you could just ignore the error).

On a related note: I recently saw a php exploit finder, which could
search php source for possibly exploitable code. It was basically a
collection of regular expressions, written in php itself, version 0.01,
but it looked interesting. Sorry, no URL, you'll have to google it.

(how far away from viruses are we yet?)

-- 
Jan-Pieter Cornet <[EMAIL PROTECTED]>
!! Disclamer: The addressee of this email is not the intended recipient. !!
!! This is only a test of the echelon and data retention systems. Please !!
!! archive this message indefinitely to allow verification of the logs.  !!
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to