SlideShare a Scribd company logo
By
P.BALAKRISHNA
07071A0531
   Security needs for large clusters may be divided into two broad
    areas:
    • Security systems aimed at avoiding unauthorized access to a
    network.
    • Security systems whose target is the detection of unauthorized
    accesses.
   Tripwire is a free software tool included in the second group.
   It monitors computers’ file systems to discover any modification
    of the stored directories and files detecting any unauthorized
    access as soon as possible. In short,
   Tripwire’s main goal is "information integrity checking".
FLOWCHART OF TRIPWIRE
IMPLEMENTATION
   Install Tripwire and customize the policy file
   If not already done, install the tripwire RPM or download
    source from www.tripwire.org.
    1. Customize configuration file(/etc/tripwire/twcfg.txt).
    2. Customize Policy file: /etc/tripwire/twpol.txt.
    3. Run the Configuration Script(/etc/tripwire/twinstall.sh).

    # twinstall.sh
   Tripwire builds a collection of file system objects
   This database serves as the baseline for integrity checks.
   To initialize the Tripwire database, use the following
    command:
    # tripwire –init
   The /var/lib/tripwire directory contains the Tripwire
    database of your system's files(*.twd)
   Compares the current, actual file system objects with their
    properties as recorded in its database.
   Violations are printed to standard output and saved in a
    report file.
   To run an integrity check, use the following command:


    # tripwire --check
   Command for printing Tripwire reports
    # twprint -m r
    The above command will display all tripwire reports.
   To print a particular Tripwire report use the following
    command:
    # twprint -m r --twrfile
      /var/lib/tripwire/report/<name>.twr
   Maintain backup drive and external data storage.
   Security breaches or authorized modifications
   If it is authorized modification then update the database
   If it is security breach then restore the original file from a
    backup or reinstall the program.
   The command to be used after integrity check to update the
    database is
# tripwire --update --twrfile
    /var/lib/tripwire/report/<name>.twr
   To change the files Tripwire records in its database, you
    need to edit the Tripwire policy file.
   First make necessary changes to sample policy file by using
    the command
    # /etc/smb.conf -> $(SEC_CONFIG);
   Next, you must tell Tripwire to generate a new
    /etc/tripwire/tw.pol signed file using the command
    # twadmin --create-polfile -S site.key
    /etc/tripwire/twpol.txt
   The text file with the configuration file changes (commonly
    /etc/tripwire/twcfg.txt) must be signed to replace the
    /etc/tripwire/tw.cfg.
   If your altered configuration text file is
    /etc/tripwire/twcfg.txt, type this command to sign it,
    replacing the current /etc/tripwire/tw.pol file:


    # twadmin --create-cfgfile -S site.key
    /etc/tripwire/twcfg.txt
   You can run a Tripwire integrity check daily by inserting the
    following commands in the script /etc/cron.daily/tripwire-
    check:

    #!/bin/sh
    HOST_NAME=`uname -n`
    if [ ! -e /var/lib/tripwire/${HOST_NAME}.twd ]; then
       echo "Error: Tripwire database for ${HOST_NAME} not found"
       echo "Run "/etc/tripwire/twinstall.sh" and/or "tripwire --init""
    else
       test -f /etc/tripwire/tw.cfg && /usr/sbin/tripwire --check
    fi
   Tripwire can email someone if a specific type of rule in the
    policy file is violated.
   It can be done using emailto= line to the rule directive
    section of each rule.
   To make sure that Tripwire's email notification configuration
    can actually send email correctly, use the following
    command:
    /usr/sbin/tripwire --test --email akadia-
    adm@akadia.com
THANK YOU
QUERIES..?

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Nur Aishah Roslan
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
PRADEEP
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
sommerville-videos
 
JASM Flyer
JASM FlyerJASM Flyer
JASM Flyer
Neville Wiles
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Manager
shelleyatkins
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
ManageEngine, Zoho Corporation
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
sommerville-videos
 
A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
kimreview
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
Shyam Kumar Singh
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Programmer
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
10-Strike Software
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
amit_monty
 
Patch management
Patch managementPatch management
Patch management
SyAM Software
 
Rcu readme
Rcu readmeRcu readme
Rcu readme
Jean Aurilio
 
Finger pointing
Finger pointingFinger pointing
Finger pointing
Boundary
 
Dynamic Analysis And Profiling Of Multi Threaded Systems
Dynamic Analysis And Profiling Of Multi Threaded SystemsDynamic Analysis And Profiling Of Multi Threaded Systems
Dynamic Analysis And Profiling Of Multi Threaded Systems
Kashif Dayo
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
Joe Shestak
 
O P Manager
O P  ManagerO P  Manager
O P Manager
blakka
 

What's hot (18)

Network security
Network securityNetwork security
Network security
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
JASM Flyer
JASM FlyerJASM Flyer
JASM Flyer
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Manager
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
 
Patch management
Patch managementPatch management
Patch management
 
Rcu readme
Rcu readmeRcu readme
Rcu readme
 
Finger pointing
Finger pointingFinger pointing
Finger pointing
 
Dynamic Analysis And Profiling Of Multi Threaded Systems
Dynamic Analysis And Profiling Of Multi Threaded SystemsDynamic Analysis And Profiling Of Multi Threaded Systems
Dynamic Analysis And Profiling Of Multi Threaded Systems
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
O P Manager
O P  ManagerO P  Manager
O P Manager
 

Viewers also liked

Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
Tripwire
 
Fitsum ristu lakew tripwire for intrusion detection
Fitsum ristu lakew tripwire for intrusion detectionFitsum ristu lakew tripwire for intrusion detection
Fitsum ristu lakew tripwire for intrusion detection
FITSUM RISTU LAKEW
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
Daknet
DaknetDaknet
Daknet
wasiya iram
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
Likan Patra
 
Seminar report
Seminar reportSeminar report
Seminar report
ashwani kumar
 
Microsoft Palladium.
Microsoft Palladium.Microsoft Palladium.
Microsoft Palladium.
Anurag Sharma
 
light tree
light treelight tree
light tree
GAYATHRI DEVI K V
 
Nokia Morph Technology
Nokia Morph TechnologyNokia Morph Technology
Nokia Morph Technology
Nishanth Nrs
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
Kummari Sanjay
 
HTML5 JavaScript APIs
HTML5 JavaScript APIsHTML5 JavaScript APIs
HTML5 JavaScript APIs
Remy Sharp
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
Tripwire
 
light tree documentation by pradeep
light tree documentation by pradeeplight tree documentation by pradeep
light tree documentation by pradeep
Pradeep Kumar
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
Sandeep Singh
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
Aarush Jewaria
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 
Light tree
Light treeLight tree
Light tree
Jitendra31291
 
Getting Started with HTML5 in Tech Com (STC 2012)
Getting Started with HTML5 in Tech Com (STC 2012)Getting Started with HTML5 in Tech Com (STC 2012)
Getting Started with HTML5 in Tech Com (STC 2012)
Peter Lubbers
 
Nokia morph
Nokia morphNokia morph
Nokia morph
Kannan G Vijai
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
VIBHOR RATHI
 

Viewers also liked (20)

Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Fitsum ristu lakew tripwire for intrusion detection
Fitsum ristu lakew tripwire for intrusion detectionFitsum ristu lakew tripwire for intrusion detection
Fitsum ristu lakew tripwire for intrusion detection
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Daknet
DaknetDaknet
Daknet
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Microsoft Palladium.
Microsoft Palladium.Microsoft Palladium.
Microsoft Palladium.
 
light tree
light treelight tree
light tree
 
Nokia Morph Technology
Nokia Morph TechnologyNokia Morph Technology
Nokia Morph Technology
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
 
HTML5 JavaScript APIs
HTML5 JavaScript APIsHTML5 JavaScript APIs
HTML5 JavaScript APIs
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
 
light tree documentation by pradeep
light tree documentation by pradeeplight tree documentation by pradeep
light tree documentation by pradeep
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Light tree
Light treeLight tree
Light tree
 
Getting Started with HTML5 in Tech Com (STC 2012)
Getting Started with HTML5 in Tech Com (STC 2012)Getting Started with HTML5 in Tech Com (STC 2012)
Getting Started with HTML5 in Tech Com (STC 2012)
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 

Similar to Tripwire

Metasploit Humla for Beginner
Metasploit Humla for BeginnerMetasploit Humla for Beginner
Metasploit Humla for Beginner
n|u - The Open Security Community
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics tools
VishnuPratap7
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
Nutan Kumar Panda
 
Device mapper multipathing
Device mapper multipathingDevice mapper multipathing
Device mapper multipathing
Anand Loganathan
 
Jakarta struts
Jakarta strutsJakarta struts
Jakarta struts
rajeevsingh141
 
Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0
pdnsoftco
 
Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
Shathees Rao
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guide
Craig Cannon
 
Red Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security AgencyRed Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security Agency
sanchetanparmar
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
Nutan Kumar Panda
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
Ashwin Pawar
 
Iwatch tech 1
Iwatch tech 1Iwatch tech 1
Iwatch tech 1
ShailajaMca
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
amiable_indian
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
rosu555
 
Pentesting iOS Apps
Pentesting iOS AppsPentesting iOS Apps
Pentesting iOS Apps
Herman Duarte
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
kuldeepakgautam
 
Linux Troubleshooting
Linux TroubleshootingLinux Troubleshooting
Linux Troubleshooting
Keith Wright
 
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
RajKumar Rampelli
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
Raja Waseem Akhtar
 

Similar to Tripwire (20)

Metasploit Humla for Beginner
Metasploit Humla for BeginnerMetasploit Humla for Beginner
Metasploit Humla for Beginner
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics tools
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
Device mapper multipathing
Device mapper multipathingDevice mapper multipathing
Device mapper multipathing
 
Jakarta struts
Jakarta strutsJakarta struts
Jakarta struts
 
Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0
 
Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guide
 
Red Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security AgencyRed Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security Agency
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
Iwatch tech 1
Iwatch tech 1Iwatch tech 1
Iwatch tech 1
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Pentesting iOS Apps
Pentesting iOS AppsPentesting iOS Apps
Pentesting iOS Apps
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux Troubleshooting
Linux TroubleshootingLinux Troubleshooting
Linux Troubleshooting
 
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 

Tripwire

  • 2. Security needs for large clusters may be divided into two broad areas: • Security systems aimed at avoiding unauthorized access to a network. • Security systems whose target is the detection of unauthorized accesses.  Tripwire is a free software tool included in the second group.  It monitors computers’ file systems to discover any modification of the stored directories and files detecting any unauthorized access as soon as possible. In short,  Tripwire’s main goal is "information integrity checking".
  • 5. Install Tripwire and customize the policy file  If not already done, install the tripwire RPM or download source from www.tripwire.org. 1. Customize configuration file(/etc/tripwire/twcfg.txt). 2. Customize Policy file: /etc/tripwire/twpol.txt. 3. Run the Configuration Script(/etc/tripwire/twinstall.sh). # twinstall.sh
  • 6. Tripwire builds a collection of file system objects  This database serves as the baseline for integrity checks.  To initialize the Tripwire database, use the following command: # tripwire –init  The /var/lib/tripwire directory contains the Tripwire database of your system's files(*.twd)
  • 7. Compares the current, actual file system objects with their properties as recorded in its database.  Violations are printed to standard output and saved in a report file.  To run an integrity check, use the following command: # tripwire --check
  • 8. Command for printing Tripwire reports # twprint -m r The above command will display all tripwire reports.  To print a particular Tripwire report use the following command: # twprint -m r --twrfile /var/lib/tripwire/report/<name>.twr
  • 9. Maintain backup drive and external data storage.
  • 10. Security breaches or authorized modifications  If it is authorized modification then update the database  If it is security breach then restore the original file from a backup or reinstall the program.  The command to be used after integrity check to update the database is # tripwire --update --twrfile /var/lib/tripwire/report/<name>.twr
  • 11. To change the files Tripwire records in its database, you need to edit the Tripwire policy file.  First make necessary changes to sample policy file by using the command # /etc/smb.conf -> $(SEC_CONFIG);  Next, you must tell Tripwire to generate a new /etc/tripwire/tw.pol signed file using the command # twadmin --create-polfile -S site.key /etc/tripwire/twpol.txt
  • 12. The text file with the configuration file changes (commonly /etc/tripwire/twcfg.txt) must be signed to replace the /etc/tripwire/tw.cfg.  If your altered configuration text file is /etc/tripwire/twcfg.txt, type this command to sign it, replacing the current /etc/tripwire/tw.pol file: # twadmin --create-cfgfile -S site.key /etc/tripwire/twcfg.txt
  • 13. You can run a Tripwire integrity check daily by inserting the following commands in the script /etc/cron.daily/tripwire- check: #!/bin/sh HOST_NAME=`uname -n` if [ ! -e /var/lib/tripwire/${HOST_NAME}.twd ]; then echo "Error: Tripwire database for ${HOST_NAME} not found" echo "Run "/etc/tripwire/twinstall.sh" and/or "tripwire --init"" else test -f /etc/tripwire/tw.cfg && /usr/sbin/tripwire --check fi
  • 14. Tripwire can email someone if a specific type of rule in the policy file is violated.  It can be done using emailto= line to the rule directive section of each rule.  To make sure that Tripwire's email notification configuration can actually send email correctly, use the following command: /usr/sbin/tripwire --test --email akadia- adm@akadia.com