Scanning your connection...
Back to Tools Directory

chkrootkit

Linux Defenses

Locally check for signs of a rootkit with chkrootkit

About

chkrootkit is a tool that locally checks for signs of a rootkit, including checks for promiscuous mode, lastlog and wtmp deletions, and LKM trojans

Details

chkrootkit is a comprehensive tool that checks for signs of a rootkit on a local system. Its key features include checks for promiscuous mode, lastlog and wtmp deletions, and LKM trojans. The tool consists of several components, including chkrootkit, ifpromisc.c, chklastlog.c, chkwtmp.c, check_wtmpx.c, chkproc.c, chkdirs.c, strings.c, and chkutmp.c. chkrootkit has been tested on various operating systems, including Linux, FreeBSD, OpenBSD, NetBSD, Solaris, HP-UX, Tru64, BSDI, and Mac OS X. The tool can detect a wide range of rootkits, worms, and LKMs, including lrk3, lrk4, lrk5, lrk6, Solaris rootkit, FreeBSD rootkit, and many others. With its ability to detect and identify rootkits, chkrootkit provides a valuable service for system administrators and security professionals. Its technical implementation details, such as its use of shell scripts and C code, make it a reliable and efficient tool. Specific use cases for chkrootkit include detecting and removing rootkits, identifying potential security vulnerabilities, and monitoring system activity for suspicious behavior. Overall, chkrootkit is a unique and valuable tool that provides a comprehensive solution for detecting and preventing rootkit attacks.

Share & Feedback

Help improve our directory

Quick Info

Open Source
Accepts Crypto
No KYC Required
Security Audited
Android App
iOS App

Privacy Scanner

See what trackers this tool uses

Scan chkrootkit

Have questions?

Use guided flow to choose the right next step

Open Guided Flow

More in Linux Defenses

Efficiently clean your system and free disk space with BleachBit

Lightweight on-demand virus scanner for Linux systems

Linux namespaces and seccomp-bpf sandbox for secure application execution