Rootkit Hunter demo: Detect and remove Linux rootkits

Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions.

While Windows is the operating system that is most often targeted by attackers, malware can find its way into other operating systems, including Linux.

In this month's screencast demonstration, Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions that can detect dozens of malicious code variants that may otherwise go undetected.

 

Want more screencasts? Visit our screencast page.

About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Home and The Academy Pro, which provide streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

Next Steps

Rootkit detection and malware removal FAQ

Detecting a Linux server hack

Rooting out a rootkit: Stage three -- Recovery

This was first published in May 2009

Dig deeper on Alternative OS security: Mac, Linux, Unix, etc.

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Peter Giannoulis, Contributor asks:

Do you have any tips for using Rootkit Hunter you'd like to share?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close