Friends,
     I am running ossec server version 2.7.1 on CentOS 6.5 and my agents
are all running version 2.7.1 in a mix of CentOS 4-6  and Debian 4-6
hosts.  On all the agents and server I have rootkit detection configured as
such:

<rootcheck>
    <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>

<rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
 </rootcheck>

with these options removed:

<localfile>
    <log_format>command</log_format>
    <command>df -h</command>
  </localfile>

  <localfile>
    <log_format>full_command</log_format>
    <command>netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort</command>
  </localfile>

  <localfile>
    <log_format>full_command</log_format>
    <command>last -n 5</command>
  </localfile>

I received the following alerts from two of my agents:

2014 Apr 14 17:09:44 (host001) a.b.c.d->rootcheck
Rule: 510 (level 7) -> 'Host-based anomaly detection event (rootcheck).'
Process '29594' hidden from /proc. Possible kernel level rootkit.


2014 Apr 14 18:51:49 (host002) e.f.g.h->rootcheck
Rule: 510 (level 7) -> 'Host-based anomaly detection event (rootcheck).'
Process '23067' hidden from /proc. Possible kernel level rootkit.

I am scratching my head as to exactly what ossec did to generate these
alerts...can anyone help explain how this works to me pls?

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to