Install chkrootkit
The chkrootkit is a security scanner to check if the system is infected with the rootkit. A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software.
Step 1: cd /usr/local/src
Step 2: wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
[root@tutorialspots /]# cd /usr/local/src [root@tutorialspots src]# wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz --2016-03-01 15:25:08-- ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz => `chkrootkit.tar.gz' Resolving ftp.pangeia.com.br... 187.33.4.179 Connecting to ftp.pangeia.com.br|187.33.4.179|:21... connected. Logging in as anonymous ... Logged in! ==> SYST ... done. ==> PWD ... done. ==> TYPE I ... done. ==> CWD /pub/seg/pac ... done. ==> SIZE chkrootkit.tar.gz ... 38616 ==> PASV ... done. ==> RETR chkrootkit.tar.gz ... done. Length: 38616 (38K) 100%[======================================>] 38,616 69.4K/s in 0.5s 2016-03-01 15:25:11 (69.4 KB/s) - `chkrootkit.tar.gz' saved [38616]
Step 3: tar -xvzf chkrootkit.tar.gz
[root@tutorialspots src]# tar -xvzf chkrootkit.tar.gz chkrootkit-0.50 chkrootkit-0.50/chkproc.c chkrootkit-0.50/COPYRIGHT chkrootkit-0.50/README.chkwtmp chkrootkit-0.50/chkutmp.c chkrootkit-0.50/chkwtmp.c chkrootkit-0.50/ifpromisc.c chkrootkit-0.50/strings.c chkrootkit-0.50/chklastlog.c chkrootkit-0.50/chkrootkit.lsm chkrootkit-0.50/check_wtmpx.c chkrootkit-0.50/chkdirs.c chkrootkit-0.50/Makefile chkrootkit-0.50/README chkrootkit-0.50/README.chklastlog chkrootkit-0.50/ACKNOWLEDGMENTS chkrootkit-0.50/chkrootkit
Step 4: cd chkrootkit-0.50
Step 5: make sense
[root@tutorialspots src]# cd chkrootkit-0.50 [root@tutorialspots chkrootkit-0.50]# make sense cc -DHAVE_LASTLOG_H -o chklastlog chklastlog.c cc -DHAVE_LASTLOG_H -o chkwtmp chkwtmp.c cc -DHAVE_LASTLOG_H -D_FILE_OFFSET_BITS=64 -o ifpromisc ifpromisc.c cc -o chkproc chkproc.c cc -o chkdirs chkdirs.c cc -o check_wtmpx check_wtmpx.c cc -static -o strings-static strings.c cc -o chkutmp chkutmp.c
Done, now we can use chkrootkit by using this command
./chkrootkit
[root@tutorialspots chkrootkit-0.50]# ./chkrootkit ROOTDIR is `/' Checking `amd'... not found Checking `basename'... not infected Checking `biff'... not found Checking `chfn'... not infected Checking `chsh'... not infected Checking `cron'... not infected Checking `crontab'... not infected Checking `date'... not infected Checking `du'... not infected Checking `dirname'... not infected Checking `echo'... not infected Checking `egrep'... not infected Checking `env'... not infected Checking `find'... not infected Checking `fingerd'... not infected Checking `gpm'... not infected Checking `grep'... not infected Checking `hdparm'... not found Checking `su'... not infected Checking `ifconfig'... not infected Checking `inetd'... not tested Checking `inetdconf'... not found Checking `identd'... not found Checking `init'... not infected Checking `killall'... not infected Checking `ldsopreload'... not infected Checking `login'... not infected Checking `ls'... not infected Checking `lsof'... not infected Checking `mail'... not infected Checking `mingetty'... not infected Checking `netstat'... not infected Checking `named'... not infected Checking `passwd'... not infected Checking `pidof'... not infected Checking `pop2'... not found Checking `pop3'... not found Checking `ps'... not infected Checking `pstree'... not infected Checking `rpcinfo'... not infected Checking `rlogind'... not found Checking `rshd'... not found Checking `slogin'... not infected Checking `sendmail'... not infected Checking `sshd'... not infected Checking `syslogd'... not infected Checking `tar'... not infected Checking `tcpd'... not infected Checking `tcpdump'... not infected Checking `top'... not infected Checking `telnetd'... not found Checking `timed'... not found Checking `traceroute'... not infected Checking `vdir'... not infected Checking `w'... not infected Checking `write'... not infected Checking `aliens'... no suspect files Searching for sniffer's logs, it may take a while... nothing found Searching for HiDrootkit's default dir... nothing found Searching for t0rn's default files and dirs... nothing found Searching for t0rn's v8 defaults... nothing found Searching for Lion Worm default files and dirs... nothing found Searching for RSHA's default files and dir... nothing found Searching for RH-Sharpe's default files... nothing found Searching for Ambient's rootkit (ark) default files and dirs... nothing found Searching for suspicious files and dirs, it may take a while... /usr/lib/.libgcrypt.so.11.hmac /usr/lib/perl5/5.8.8/i386-linux-thread-multi/.pac klist /usr/lib/.libfipscheck.so.1.1.0.hmac /usr/lib/.libfipscheck.so.1.hmac /usr /lib/python2.4/plat-linux2/.relocation-tag /usr/lib/python2.4/config/.relocation -tag /usr/lib/python2.4/distutils/.relocation-tag /usr/lib/gtk-2.0/immodules/.re location-tag /lib/.libssl.so.0.9.8e.hmac /lib/.libcrypto.so.0.9.8e.hmac /lib/.li bcrypto.so.6.hmac /lib/.libssl.so.6.hmac Searching for LPD Worm files and dirs... nothing found Searching for Ramen Worm files and dirs... nothing found Searching for Maniac files and dirs... nothing found Searching for RK17 files and dirs... nothing found Searching for Ducoci rootkit... nothing found Searching for Adore Worm... nothing found Searching for ShitC Worm... nothing found Searching for Omega Worm... nothing found Searching for Sadmind/IIS Worm... nothing found Searching for MonKit... nothing found Searching for Showtee... nothing found Searching for OpticKit... nothing found Searching for T.R.K... nothing found Searching for Mithra... nothing found Searching for LOC rootkit... nothing found Searching for Romanian rootkit... nothing found Searching for HKRK rootkit... nothing found Searching for Suckit rootkit... nothing found Searching for Volc rootkit... nothing found Searching for Gold2 rootkit... nothing found Searching for TC2 Worm default files and dirs... nothing found Searching for Anonoying rootkit default files and dirs... nothing found Searching for ZK rootkit default files and dirs... nothing found Searching for ShKit rootkit default files and dirs... nothing found Searching for AjaKit rootkit default files and dirs... nothing found Searching for zaRwT rootkit default files and dirs... nothing found Searching for Madalin rootkit default files... nothing found Searching for Fu rootkit default files... nothing found Searching for ESRK rootkit default files... nothing found Searching for rootedoor... nothing found Searching for ENYELKM rootkit default files... nothing found Searching for common ssh-scanners default files... nothing found Searching for Linux/Ebury - Operation Windigo ssh... nothing found Searching for 64-bit Linux Rootkit ... nothing found Searching for 64-bit Linux Rootkit modules... nothing found Searching for suspect PHP files... nothing found Searching for anomalies in shell history files... nothing found Checking `asp'... not infected Checking `bindshell'... not infected Checking `lkm'... chkproc: nothing detected chkdirs: nothing detected Checking `rexedcs'... not found Checking `sniffer'... venet0: not promisc and no PF_PACKET sockets venet0:0: not promisc and no PF_PACKET sockets Checking `w55808'... not infected Checking `wted'... chkwtmp: nothing deleted Checking `scalper'... not infected Checking `slapper'... not infected Checking `z2'... chklastlog: nothing deleted Checking `chkutmp'... chkutmp: nothing deleted Checking `OSX_RSPLUG'... not infected