While Windows is the operating system that is most often targeted by attackers, malware can find its way into other...
operating systems, including Linux.
In this month's screencast demonstration, Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions that can detect dozens of malicious code variants that may otherwise go undetected.
Want more screencasts? Visit our screencast page.
About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Home and The Academy Pro, which provide streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.
Rootkit detection and malware removal FAQ
Detecting a Linux server hack
Rooting out a rootkit: Stage three -- Recovery
Dig Deeper on Alternative OS security: Mac, Linux, Unix, etc.
Peter Giannoulis, Contributor asks:
Do you have any tips for using Rootkit Hunter you'd like to share?
0 ResponsesJoin the Discussion