Hello Michael,

On Sat, 27 Nov 2010 06:19:34 +0100 mistige de onwaarschijnlijke 
<mist...@gmail.com> wrote:
>rkhunter did make sure there was no known rootkit there, so that 
was nice to know.
>Still, it was running the malware all the while from somewhere.
Please be aware Rootkit Hunter is a post-op passive tool. Running 
RKH is no replacement for machine and service hardening and regular 
auditing.


>There was no stuff in /tmp and /var/tmp where people like to stash 
their malware either.
>However, by checking ps, lsof and netstat, I found an infection in 
directory [/dev/shm/  /fs], so a spaces subdirectory in tmpfs.
>
>rkhunter does not check in /tmp, /var/tmp and /dev/shm for malware
Have a look at the 'suspscan' feature (configuration file, 
documentation). Suspscan may be a kludge (disabled by default) and 
certainly a performance drain but it does detect suspect items in 
directories you configure.


Best regards,
unSpawn
---


------------------------------------------------------------------------------
Increase Visibility of Your 3D Game App & Earn a Chance To Win $500!
Tap into the largest installed PC base & get more eyes on your game by
optimizing for Intel(R) Graphics Technology. Get started today with the
Intel(R) Software Partner Program. Five $500 cash prizes are up for grabs.
http://p.sf.net/sfu/intelisp-dev2dev
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to