- MD5 hash compare
- Look for default files used by rootkits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files
Rootkit Hunter is released as GPL licensed project and free for everyone to use.* No, not really 99.9%.. It's just another security layer
System requirements:
- Compatible operating system (see 'Supported operating systems')
- Bourne Again Shell (BASH)
Supported operating systems ::
- Most Linux distributions
- Most *BSD distributions
Download ::
Linux :: RootKit Hunter v1.4.0 (.tar.gz)
Official Website :: http://www.rootkit.nl/projects/rootkit_hunter.html
0 comments :
Post a Comment