On 2007-05-15 08:48:44 -0700, Andrew Sackville-West wrote:
> If you're already compromised, chkrootkit won't do you any good as it
> could be compromised too.

Perhaps reboot the machine in single user (in case a rootkit is run
from the init files), check the ctime of chkrootkit, and if it is OK,
this means that it hasn't been compromised.

> I recommend you take the machine offline and monitor it for more
> similar activity. If the activity occurs while offline, its probably
> your doing, at not someone else's.

If some daemon has been installed, there could be some activity...

-- 
Vincent Lefèvre <[EMAIL PROTECTED]> - Web: <http://www.vinc17.org/>
100% accessible validated (X)HTML - Blog: <http://www.vinc17.org/blog/>
Work: CR INRIA - computer arithmetic / Arenaire project (LIP, ENS-Lyon)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to