CentOS 6
Sponsored Link

Detect RootKit - ChkrootKit
2014/08/26
  Install ChkrootKit to detect rootkit on your Server.
# install from EPEL

[root@dlp ~]#
yum --enablerepo=epel -y install chkrootkit
[root@dlp ~]#
chkrootkit
 
# execute
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
...
...
...
Searching for ENYELKM rootkit default files... nothing found
Searching for common ssh-scanners default files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... chkproc: nothing detected
chkdirs: nothing detected
Checking `rexedcs'... not found
Checking `sniffer'... eth1: not promisc and no PF_PACKET sockets
Checking `w55808'... not infected
Checking `wted'... chkwtmp: nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... chklastlog: nothing deleted
Checking `chkutmp'... chkutmp: nothing deleted
Checking `OSX_RSPLUG'... not infected

# show only INFECTED results like follows

[root@dlp ~]#
chkrootkit | grep INFECTED

[root@dlp ~]#
# no ploblem if nothing shows
Matched Content
 
Tweet