Verifying installed RPM packages
It's been said the safest system is one that's "powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards." (Gene Spafford) Your CentOS system is probably concrete-free, which means it's at the risk of attack. This recipe shows you how to audit your system using rpm
to make sure its installed software hasn't been compromised by an attacker.
Getting ready
This recipe requires a CentOS system with a working network connection. Administrative privileges are also required, either by logging in with the root
account or through the use of sudo
.
How to do it...
It is important to first make a backup of the RPM database at /var/lib/rpm
. There are many ways to do this, but for the sake of this ...
Get CentOS 7 Server Deployment Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.