
Hacking Techniques and Tools • Chapter 5 197
Thus began a line-by-line audit of over 20,000 lines of PERL scripts
and C source code. Over time, the process diagram began to take shape.
However, it seemed that every facet that was discovered in the system
yielded yet another two facets that were unknown. A line-by-line audit
provided only a sanity check of each specific function (all of which
passed). In order to assess any real security risk of an introduced back
door, a full-blown process audit would need to be performed.
Upon mention of the cost associated with mapping out the entirety
of the process flow and assessing the security of each step of the ...