IDS mailing list archives

Re: Checking for backdoors in software products


From: Angel Todorov <atodorov () acm org>
Date: Thu, 5 Jun 2003 12:44:18 +0100


Hello Bojidar,

        you can use chkrootkit if that software is written for unix, and, if in some way it (possibly) modifies the 
system executables.

 

On 4 Jun 2003 14:22:29 -0000
"Bojidar Tzendov" <bojidar_tzendov () mtel net> wrote:



Dear All,

A few software companies want we to distribute their products abrpad.
Do you know a system, software or methodology for checking that software 
products for possible backdoors?

regards,
Bojidar

-------------------------------------------------------------------------------
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities 
- including intrusion identification, relevancy, direction, impact and analysis 
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: 
http://www.securityfocus.com/IntruVert-focus-ids2
-------------------------------------------------------------------------------


-------------------------------------------------------------------------------
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities 
- including intrusion identification, relevancy, direction, impact and analysis 
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: 
http://www.securityfocus.com/IntruVert-focus-ids2
-------------------------------------------------------------------------------


Current thread: