It's been said the safest system is one that's "powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards." (Gene Spafford) Your CentOS system is probably concrete-free, which means it's at the risk of attack. This recipe shows you how to audit your system using rpm
to make sure its installed software hasn't been compromised by an attacker.
This recipe requires a CentOS system with a working network connection. Administrative privileges are also required, either by logging in with the root
account or through the use of sudo
.
It is important to first make a backup of the RPM database at /var/lib/rpm
. There are many ways to do this, but for the sake of this example, we'll make an ISO image of the directory which you can then archive or burn to disc:
Install the
genisoimage
andwodim
packages for the necessary tools to create ISO images and to burn them to disc:yum install genisoimage wodim
Create the...