- Community Home
- >
- Servers and Operating Systems
- >
- Legacy
- >
- Secure OS Software for Linux
- >
- check for rootkits
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 06:50 AM
тАО12-01-2008 06:50 AM
howto check my debian server for rootkits ?
I have clamav installed, but I'm not sure if clamav could find rootkits.
kind regards
chris
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 07:03 AM
тАО12-01-2008 07:03 AM
Solutionhttp://www.chkrootkit.org/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 08:18 AM
тАО12-01-2008 08:18 AM
Re: check for rootkits
apt-get install chkrootkit
regards,
ivan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 08:18 AM
тАО12-01-2008 08:18 AM
Re: check for rootkits
apt-get install rkhunter
regards,
ivan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-02-2008 01:16 AM
тАО12-02-2008 01:16 AM
Re: check for rootkits
'rkhunter --update' if net connected.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-02-2008 01:23 AM
тАО12-02-2008 01:23 AM
Re: check for rootkits
Also check the writeable directories (for non superusers) for files that could be executed.
But if you're this paranoid about being hacked I would suggest you look into GRSEC-kernel or the like.
TPE is a wonderful way to stop users from doing things you don't want them to :P
Best regards
Fredrik Eriksson
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-17-2009 07:56 AM
тАО08-17-2009 07:56 AM
Re: check for rootkits
On a known safe machine, create a CD with the binaries you want to use to inspect your system for unusual activity. A very nice pocket reference guide can be downloaded from SANS.org to help you find indication of an intrusion.
http://www.sans.org/score/checklists/ID_Linux.pdf
Also, Trendmicro's housecall program can do an online scan of Linux distributions that support libc6. It may help, but I have never tried it on a Linux box.
Good luck, a well done rootkit can be hard to find.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-07-2011 06:01 AM
тАО01-07-2011 06:01 AM
Re: check for rootkits
Another tool for finding hidden ports is "unhide". http://linuxappfinder.com/package/unhide
Add to the rkhunter, chrootkit, AIDE and auditd, then send the logs to rsyslog, OSSEC or Snort.
Checking the host with netstat and ps -ef, if already rootkitted won't help, especially if you don't have a baseline of what the host should be set to. You could also check teh host locally with these tools on a regular basis, but compare the output of the netstat with the output of nmap or OpenVAS (www.openvas.org). This will show you a "inside" vs. "outside" perspective.
Best regards,
Don