Solved

which IP

Posted on 2014-02-12
7
265 Views
Last Modified: 2014-02-16
Dear Experts,

Is it possible to know which IP address modified a script file in Solaris?

Thanks,
0
Comment
Question by:oamal2001
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 38

Expert Comment

by:Gerwin Jansen, EE MVE
ID: 39852894
Files are modified by users, not IP addresses.

In case you have logging enabled that shows you when a user logged on from which IP address then you could match the time stamp of the file to that of the logon time.

But if you have multiple logons at the same with the same user-id (functional use) then this will be impossible.
0
 
LVL 8

Accepted Solution

by:
Pepe2323 earned 500 total points
ID: 39854088
That can be a real challenge, all depends of how many user access to your server

if i ware you i will try first check when this script was changed

ls -lc or ls -ltr filename -- you will get the date and time of the last change of that filename

you will need to try to match that time with user connected at that time

last  command can help you but if you have many connections at that time well, this will be difficult

My guess is that script only a few persons have rights to modify it i guess  -- example if its a  script that only root can modify then means not all user have root account ( i hope so )

i hope remote access to the server with root account is not allowed

You policies on that server can make this research  more simple or something impossible.

Regards.
0
 
LVL 38

Expert Comment

by:Gerwin Jansen, EE MVE
ID: 39862407
@oamal2001 - Can you elaborate on how the solution you've selected solves your question?
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:oamal2001
ID: 39862417
I checked when the file last modified , checked who were logged in at that time and matched that time with user connected at that time
0
 
LVL 38

Expert Comment

by:Gerwin Jansen, EE MVE
ID: 39862422
@oamal2001 - Ok, so you got an answer to which user modified the file. That is an answer to a different question (Who modified ... instead of Which IP modified ...), I suggest that you have this question deleted.
0
 

Author Comment

by:oamal2001
ID: 39862427
You are right I needed from the beginning the IP address , but it happen that modification of the file were on a time only one user logged to the system and because I'm not familiar with UNIX administration I did not think about the time of modification.
0
 
LVL 38

Expert Comment

by:Gerwin Jansen, EE MVE
ID: 39862682
Ok, you've got your answer in the end, I'll just make sure this question is removed from search results. Thanks.
0

Featured Post

Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question