chkrootkit
Check system for known rootkits
SYNOPSIS
chkrootkit [options]
PARAMETERS
-h
Shows the help message and exits.
-V
Shows the version information and exits.
-q
Quiet mode. Only prints infected files or errors.
-r root_dir
Specifies the root directory to check (default is /).
-x
Expert mode. Displays more detailed information.
-k dirname
Specifies an alternative directory where chkrootkit will store its temporary files and databases.
-d
Enable debugging output.
-n testname
Execute only one test
DESCRIPTION
chkrootkit is a Unix-based tool designed to detect signs of a rootkit infection on a system. It scans system binaries for known rootkit modifications, altered system commands, and performs various security checks to identify potential vulnerabilities. chkrootkit consists of several shell scripts and compiled programs that quickly and thoroughly inspect critical system files and processes for malicious code. It helps system administrators identify security breaches and potentially compromised systems. While chkrootkit is useful, it's important to remember that it's not a foolproof solution. It can produce false positives and may not detect all rootkits, especially newer or custom-designed ones. A layered security approach, combining multiple security tools and proactive system hardening, is always recommended for optimal protection.
CAVEATS
chkrootkit can produce false positives. It is important to investigate any potential issues identified by the tool. It also may not detect rootkits that are more recent or customized. Always use it with updated virus and malware scanner for better result.
<B>FALSE POSITIVES</B>
It's crucial to understand that chkrootkit sometimes reports false positives. This happens when a legitimate file or process triggers a detection rule. Before taking any action based on a chkrootkit report, carefully verify the findings.
<B>BEST PRACTICES</B>
To maximize the effectiveness of chkrootkit, run it regularly, keep it updated, and complement it with other security tools like intrusion detection systems and malware scanners.
<B>SECURITY CONSIDERATIONS</B>
It should be ensured, that the command is executed from a trusted source. compromised or modified chkrootkit executables can provide wrong results to hide rootkits.
HISTORY
chkrootkit was initially developed by Nelson Murilo and Klaus Steding-Jessen. It emerged as a response to the growing threat of rootkits compromising Linux systems. Over the years, it has been continuously updated and maintained by the open-source community to address new rootkit variants and vulnerabilities. Its initial focus was on detecting the older generation of rootkits, which were relatively simple in their design and modification techniques. It remains a widely used and valuable tool for system administrators to assess the security posture of their Linux servers and workstations.
SEE ALSO
rkhunter(8), aide(1), tripwire(1)