[tags]scanner,exploits,linux[/tags]
[short_descr]Scans for rootkits, backdoors and possible local exploits.[/short_descr]
[link] https://sourceforge.net/projects/rkhunter/ [/link]
[long_descr]
It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. rkhunter is notable due to its inclusion in popular operating systems (Fedora, Debian, etc.)
[tags]scanner,exploits,linux[/tags] [short_descr]Scans for rootkits, backdoors and possible local exploits.[/short_descr] [link] https://sourceforge.net/projects/rkhunter/ [/link] [long_descr] It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. rkhunter is notable due to its inclusion in popular operating systems (Fedora, Debian, etc.)
The tool has been written in Bourne shell, to allow for portability. It can run on almost all UNIX-derived systems. [/long_descr] [image] https://raw.githubusercontent.com/gwen001/offsectools_www/main/tmp/b980df9ad414f7b87bc6bfd8d8b9692d.png [/image]