This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "Rkhunter" – news · newspapers · books · scholar · JSTOR (May 2023) (Learn how and when to remove this message) |
rkhunter on Mac OS X | |
Initial release | 2006; 19 years ago (2006) |
---|---|
Stable release | 1.4.6 / 20 February 2018; 6 years ago (2018-02-20) |
Repository | |
Written in | Bourne shell, Perl |
Operating system | Unix-like |
Type | rootkit detector |
License | GNU General Public License |
Website | sourceforge |
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. rkhunter is notable due to its inclusion in popular operating systems (Fedora, Debian, etc.)
The tool has been written in Bourne shell, to allow for portability. It can run on almost all UNIX-derived systems.
Development
In 2003, developer Michael Boelen released the version of Rootkit Hunter. After several years of development, early 2006, he agreed to hand over development to a development team. Since that time eight people have been working to set up the project properly and work towards the much-needed maintenance release. The project has since been moved to SourceForge.
See also
- chkrootkit
- Lynis
- OSSEC
- Samhain (software)
- Host-based intrusion detection system comparison
- Hardening (computing)
- Linux malware
- MalwareMustDie
- Rootkit
References
- "A way to detect the rootkits and exploits in CentOS/RHEL". medium.com. October 29, 2018. Retrieved 2024-07-04.
- "Fedora Packages Search". apps.fedoraproject.org.
- "Debian -- Details of package rkhunter in sid". packages.debian.org.
External links
This Unix-related article is a stub. You can help Misplaced Pages by expanding it. |