Search for backdoor programs in Linux

Source: Internet
Author: User

Each process has a PID, and each PID has a corresponding directory under the/proc Directory, which is the implementation of the Linux (current kernel 2.6) system. Generally, backdoor programs cannot be found in ps and other process viewing tools, because these commonly used tools and even system libraries are basically passive after the system is infiltrated (a large number of rootkits are circulating on the Internet. If it is a kernel-level Trojan, this method will be ineffective ). Because the modification of the system kernel is relatively complex (if the kernel has been modified or a kernel-level Trojan, it is more difficult to find out), In/proc, basically, traces of Trojans can also be found. Idea: process ID in/proc, which cannot be viewed (hidden) in ps. Bash Shell:

#! /Bin/bashstr_pids = "'ps-A | awk' {print $1}'' "for I in/proc/[[: digit:] *; doif echo "$ str_pids" | grep-qs 'basename "$ I" '; then: else echo "Rootkit's PID: $ (basename" $ I ")" fidone

 

Discussion: Check whether the system (Linux) is hacked. The complexity of the system depends mainly on whether the intruders "scan the end" and do enough work. For an intrusion that requires sufficient homework, it will be a matter of precision and pain to clean up. In this case, professional third-party tools (open-source, for example, tripwire or aide. Professional tools are difficult to deploy and use, and not all administrators can use them skillfully. In fact, the Linux system itself has provided a "Verification" mechanism, and the program on the inspection system has not been modified. For example, the rpm package management system provides the-V function: rpm-Va can verify all the packages on the system, and output and install the modified files and related information. However, the rpm system may be damaged, for example, modified.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.