Detecting Rootkits on a Linux machine



Rootkits are a piece (or pieces) of software that someone can be used once a system is compromised to a) regain access to a system and b) remove traces of a compromise and c) many times hide itself. There are some tools for linux based systems that can be run to detect traces of rootkits and probably the best known is a tool called chkrootkit. I’ve know of it for what seems like years now and it can run a relatively quick test for traces of a wide range of KNOWN linux rootkits.


There is a good tutorial on how to install and use it here what’s probably the best to point out is that you should not install and then just run it occasionally, it should be put either on read-only media, or removable media so that an attacker could not discover it’s presence and alter it to ignore the attackers rootkit. (Or you could keep a local copy just to give them something else to do and do your REAL scanning from a read-only/removable… )

I did find a referral to another rootkit detectorrkhunter which I haven’t yet tested, but looks promising… a more direct link is here.

Happy rootkit hunting?

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove System Adware Scanner 2010 | System Adware Scanner 2010 Removal Guide System Adware Scanner 2010 is a new and aggressive rogue antivirus application. Once installed on a system it creates a program that acts as a guard of sorts for it's main process. This guard process is called noterminate and will pop up warnings and encourage users to purchase the rogue......
  • Ap coverage of hacker convention Apnews has an article on the recent "hacker convention" in Las Vegas. In typical media fashion they paint with a broad brush to display it as "a no-mans land where customary adversaries, feds vs. digital mavericks are supposed to share ideas about making the internet safe." In reality, realize that......
  • How to Remove DefendAPC | DefendAPC Removal Guide DefendAPC is the latest variation on the Wini family of rogue antivirus. It is typically promoted via the use of trojans, malware and aggressive advertising. Once installed on the system it will run supposed scans of the system claiming that you have viruses on your system and that you have......
Blog Traffic Exchange Related Websites
  • Wii Fit: Healthy Weight Loss? Have you ever wondered if those video game exercise programs work? Can you achieve healthy weight loss playing a video game? The Wii Fit is the most popular of the weight loss programs that are on the market today. It has sold many thousands of units, but some wonder if......
  • Red Hat Fedora 10 is Out For all open source Lovers, Red Hat Fedora 10 Linux is out with major improvements! The Red Hat-sponsored Fedora Project on Tuesday released Fedora 10, the latest version of the free Linux-based operating system, with a wide range of improvements in areas such as virtualization management, networking, boot time and......
  • Goldfish And Marine Aquariums I’ve been involved with aquariums for 40 years or more and no, I’m not going to try advising the secret of keeping goldfish in salt water! What I’m going to do is remember, if I may. Over 40 years ago I had nothing to do with fish. What did......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site