Rootkit Hunter demo: Detect and remove Linux rootkits

Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions.

While Windows is the operating system that is most often targeted by attackers, malware can find its way into other...

operating systems, including Linux.

In this month's screencast demonstration, Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions that can detect dozens of malicious code variants that may otherwise go undetected.

 

Want more screencasts? Visit our screencast page.

About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Home and The Academy Pro, which provide streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

Next Steps

Rootkit detection and malware removal FAQ

Detecting a Linux server hack

Rooting out a rootkit: Stage three -- Recovery

This was last published in May 2009

Dig Deeper on Alternative OS security: Mac, Linux, Unix, etc.

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you have any tips for using Rootkit Hunter you'd like to share?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close