{
  "created": "2015-12-20T19:56:38Z",
  "hierarchy": [
    {
      "name": "ROOT",
      "type": "folder",
      "uri": "/ROOT"
    },
    {
      "name": "RKHunter Notes",
      "type": "article",
      "uri": "RKHunter_Notes"
    }
  ],
  "html": "<!DOCTYPE html>\n<html lang=\"en\">\n  <head>\n    <meta charset=\"UTF-8\"/>\n    <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge\"/>\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\"/>\n    <meta property=\"og:image\" content=\"/img/logo512.png\"/>\n    <meta property=\"og:site_name\" content=\"Nikhil's Personal Wiki\"/>\n    <link rel=\"og:image\" href=\"/img/logo512.png\"/>\n    <link rel=\"icon\" href=\"/img/favicon.png\"/>\n    <link rel=\"apple-touch-icon\" href=\"/img/logo192.png\"/>\n    <link rel=\"stylesheet\" href=\"/css/styles.css\"/>\n    <link rel=\"stylesheet\" href=\"/css/highlight.css\"/>\n    <title>RKHunter Notes &ndash; Nikhil's Personal Wiki</title>\n    <script type=\"text/javascript\" id=\"MathJax-script\" defer src=\"https://cdn.jsdelivr.net/npm/mathjax@3/es5/tex-chtml.js\"></script>\n    <script defer data-domain=\"wiki.nikhil.io\" src=\"https://plausible.io/js/plausible.js\"></script>\n  </head>\n  <body>\n    <noscript>\n      👉 A few things won&#8217;t work if you have JavaScript disabled.\n    </noscript>\n    <div class=\"container article\">\n      <header>\n        <nav>\n          <ul>\n            <li>\n              <a href=\"/archive\"  title=\"Archive\">\n                <span>Archive</span>\n              </a>\n            </li>\n            <li>\n              <a href=\"/Home\"  title=\"Home\">\n                <span>Home</span>\n              </a>\n            </li>\n            <li>\n              <a href=\"/random\"  title=\"See a random article\">\n                <span>Random</span>\n              </a>\n            </li>\n            \n            \n              \n                <li>\n                  <a href=\"/RKHunter_Notes/raw\"  title=\"View Source\">\n                    <span>Raw</span>\n                  </a>\n                </li>\n              \n              \n            \n            \n            \n            \n              \n                <li>\n                  <a href=\"/RKHunter_Notes/revisions\" >\n                    <span>Revisions</span>\n                  </a>\n                </li>\n              \n            \n            \n              \n                \n                  <li>\n                    <a href=\"/RKHunter_Notes/index.json\" title=\"View JSON Object\">\n                      <span>JSON</span>\n                    </a>\n                  </li>\n                \n              \n            \n          </ul>\n        </nav>\n      </header>\n      <main>\n        \n  <nav>\n  <ul>\n    \n      <li>\n        <a data-entity-type=\"folder\" href=\"/ROOT\" title=\"ROOT\">Root</a>\n      </li>\n    \n      <li>\n        <a data-entity-type=\"article\" href=\"/RKHunter_Notes\" title=\"RKHunter Notes\">RKHunter Notes</a>\n      </li>\n    \n    \n    \n    \n    \n  </ul>\n</nav>\n\n  <h1>RKHunter Notes\n    \n  </h1>\n  <h2>Installation</h2>\n<p><a href=\"http://sourceforge.net/projects/rkhunter/files/\">Download the tarball</a>,<br />\nextract it, and:</p>\n<pre><code>./installer.sh --layout default --install\n</code></pre>\n<p>You can also specify <code>--layout RPM</code> instead and create an RPM. However,<br />\nyou will need to export a value for the <code>$RPM_BUILD_ROOT</code> variable.<br />\n<code>rkhunter</code> installs itself as follows (on a 64-bit machine):</p>\n<pre><code>INSTALLDIR=/usr/local  \nDBDIR=/var/lib/rkhunter/db  \nSCRIPTDIR=/usr/local/lib64/rkhunter/scripts  \nTMPDIR=/var/lib/rkhunter/tmp  \nUSER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf\n</code></pre>\n<h2>Update</h2>\n<pre><code>[root@support rkhunter-1.3.6]# rkhunter --update  \n[ Rootkit Hunter version 1.3.6 ]  \n  \nChecking rkhunter data files...  \n  Checking file mirrors.dat                                  [ No update ]  \n  Checking file programs_bad.dat                             [ No update ]  \n  Checking file backdoorports.dat                            [ No update ]  \n  Checking file suspscan.dat                                 [ No update ]  \n  Checking file i18n/cn                                      [ No update ]  \n  Checking file i18n/de                                      [ No update ]  \n  Checking file i18n/en                                      [ No update ]  \n  Checking file i18n/zh                                      [ No update ]  \n  Checking file i18n/zh.utf8                                 [ No update ]\n</code></pre>\n<h2>Configure</h2>\n<p>Edit <code>/etc/rkhunter.conf</code> and make sure you have the package manager set<br />\nto RPM:</p>\n<pre><code>PKGMGR=RPM\n</code></pre>\n<p>Now create the properties file. <em>It is <strong>vitally</strong> important to do this<br />\non a system you&rsquo;re <strong>sure</strong> hasn&rsquo;t been compromised.</em></p>\n<pre><code>rkhunter --propupd\n</code></pre>\n<p>Now scan your system:</p>\n<pre><code>rkhunter -c\n</code></pre>\n<p>The output is sent to <code>/var/log/rkhunter.log</code>.</p>\n<h2>Other stuff</h2>\n<ul>\n<li>\n<p>In case you&rsquo;re warned about scripts, files and directories which you<br />\n<em>know</em> are okay, you can whitelist them with <code>SCRIPTWHITELIST</code>,<br />\n<code>ALLOWHIDDENFILE</code>, and <code>ALLOWHIDDENDIR</code> respectively in<br />\n<code>rkhunter.conf</code>.</p>\n</li>\n<li>\n<p>You may get warnings like these in <code>rkhunter.log</code>:</p>\n<pre><code>Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...\n</code></pre>\n</li>\n</ul>\n<p>This may or may not be innocuous, so it&rsquo;s best to check. Use the files<br />\nbelow.</p>\n<h3>Quick checker script</h3>\n<pre tabindex=\"0\" class=\"chroma\"><code><span class=\"line\"><span class=\"cl\"><span class=\"cp\">#!/bin/bash  \n</span></span></span><span class=\"line\"><span class=\"cl\"><span class=\"cp\"></span>    \n</span></span><span class=\"line\"><span class=\"cl\"><span class=\"nv\">SUSP_FILES</span><span class=\"o\">=</span><span class=\"k\">$(</span>cat suspiciousfilelist<span class=\"k\">)</span>  \n</span></span><span class=\"line\"><span class=\"cl\">lsof -F n -w -n <span class=\"p\">|</span> grep <span class=\"s1\">&#39;^n/&#39;</span> <span class=\"p\">|</span> sed -e <span class=\"s1\">&#39;s/^n//&#39;</span> <span class=\"p\">|</span> sort <span class=\"p\">|</span> uniq <span class=\"p\">|</span> grep <span class=\"s2\">&#34;</span><span class=\"nv\">$SUSP_FILES</span><span class=\"s2\">&#34;</span>\n</span></span></code></pre><h3>Full list of files</h3>\n<pre><code>backdoor  \nadore.o  \nmod_rootme.so  \nphide_mod.o  \nlbk.ko  \nvlogger.o  \ncleaner.o  \ncleaner  \nava  \ntzava  \nmod_klgr.o  \nhydra  \nhydra.restore  \nras2xm  \nvobiscum  \nsshd3  \nsystem  \nt0rnsb  \nt0rns  \nt0rnp  \nrx4u  \nrx2me  \ncrontab  \nsshdu  \nglotzer  \nholber  \nxhide  \nxh  \nemech  \npsybnc  \nmech  \nhttpd.bin  \nmh  \nxl  \nwrite  \nPhantasmagoria.o  \nlkt.o  \nnlkt.o\n</code></pre>\n<h2>Sources</h2>\n<ul>\n<li><a href=\"http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/\">Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter Software</a></li>\n<li><a href=\"http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html\">rkhunter installation notes</a></li>\n<li><a href=\"http://packages.sw.be/rkhunter/\">rkhunter RPMs on sw.be</a></li>\n<li><a href=\"http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH\">Detailed Installation and Configuration</a></li>\n</ul>\n\n\n      </main>\n      <footer>\n        <p>\n          \n        </p>\n        <ul>\n          \n  <li>3,867 bytes</li>\n  \n    <li>Created on Sunday, 20 December 2015 at 19:56 UTC</li>\n    <li>Modified on Tuesday, 13 January 2026 at 18:47 UTC</li>\n    <br/>\n    <li>\n      <a\n        href=\"https://github.com/afreeorange/wiki.nikhil.io.articles/edit/master/RKHunter Notes.md\"\n        title=\"Edit this article\">Edit this article</a>\n    </li>\n  \n\n          <li>\n            <a href=\"https://github.com/afreeorange/bock\" title=\"View the project that generates this wiki on Github\">bock\n            5.2.0-beta</a>\n          </li>\n        </ul>\n      </footer>\n    </div>\n    \n    \n      <script type=\"text/javascript\">\n        /**\n         * Quick shortcut to take me to the search box which is 90% of how I navigate\n         * this wiki anyway.\n         */\n        document.body.addEventListener(\n          \"keypress\", (e) => e.key === \"f\"\n          ? window.location.assign(\"/archive\")\n          : null);\n        window.MathJax = {\n          tex: {\n            inlineMath: [\n              [\n                '$', '$'\n              ],\n              [\n                '\\\\(', '\\\\)'\n              ]\n            ]\n          },\n          svg: {\n            fontCache: 'global'\n          }\n        };\n      </script>\n    \n  </body>\n</html></head></html>\n",
  "id": "02413a45-6b5f-533b-81f5-ea8bd9b96c4f",
  "modified": "2026-01-13T18:47:28Z",
  "revisions": [
    {
      "authorEmail": "mail@nikhil.io",
      "authorName": "Nikhil Anand",
      "date": "2026-01-13T18:47:28Z",
      "id": "2436477560f26e23d00a24add1cbfeafdca4af78",
      "shortId": "24364775",
      "subject": "No compression\n",
      "content": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n    ./installer.sh --layout default --install\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n    INSTALLDIR=/usr/local  \n    DBDIR=/var/lib/rkhunter/db  \n    SCRIPTDIR=/usr/local/lib64/rkhunter/scripts  \n    TMPDIR=/var/lib/rkhunter/tmp  \n    USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf\n\nUpdate\n------\n\n    [root@support rkhunter-1.3.6]# rkhunter --update  \n    [ Rootkit Hunter version 1.3.6 ]  \n      \n    Checking rkhunter data files...  \n      Checking file mirrors.dat                                  [ No update ]  \n      Checking file programs_bad.dat                             [ No update ]  \n      Checking file backdoorports.dat                            [ No update ]  \n      Checking file suspscan.dat                                 [ No update ]  \n      Checking file i18n/cn                                      [ No update ]  \n      Checking file i18n/de                                      [ No update ]  \n      Checking file i18n/en                                      [ No update ]  \n      Checking file i18n/zh                                      [ No update ]  \n      Checking file i18n/zh.utf8                                 [ No update ]\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n    PKGMGR=RPM\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n    rkhunter --propupd\n\nNow scan your system:\n\n    rkhunter -c\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n*   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n*   You may get warnings like these in `rkhunter.log`:\n\n        Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n```bash\n#!/bin/bash  \n    \nSUSP_FILES=$(cat suspiciousfilelist)  \nlsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"\n```\n\n### Full list of files\n\n    backdoor  \n    adore.o  \n    mod_rootme.so  \n    phide_mod.o  \n    lbk.ko  \n    vlogger.o  \n    cleaner.o  \n    cleaner  \n    ava  \n    tzava  \n    mod_klgr.o  \n    hydra  \n    hydra.restore  \n    ras2xm  \n    vobiscum  \n    sshd3  \n    system  \n    t0rnsb  \n    t0rns  \n    t0rnp  \n    rx4u  \n    rx2me  \n    crontab  \n    sshdu  \n    glotzer  \n    holber  \n    xhide  \n    xh  \n    emech  \n    psybnc  \n    mech  \n    httpd.bin  \n    mh  \n    xl  \n    write  \n    Phantasmagoria.o  \n    lkt.o  \n    nlkt.o\n\nSources\n-------\n\n*   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n*   [rkhunter installation notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n*   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n*   [Detailed Installation and Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n"
    },
    {
      "authorEmail": "mail@nikhil.io",
      "authorName": "Nikhil Anand",
      "date": "2015-12-27T07:27:56Z",
      "id": "1aa29105a45aa67523ffb61e73bcc415f935a47e",
      "shortId": "1aa29105",
      "subject": "Fix Markdown conversion\n\nSaw half a season of The Office\n",
      "content": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n    ./installer.sh --layout default --install\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n    INSTALLDIR=/usr/local  \n    DBDIR=/var/lib/rkhunter/db  \n    SCRIPTDIR=/usr/local/lib64/rkhunter/scripts  \n    TMPDIR=/var/lib/rkhunter/tmp  \n    USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf\n\nUpdate\n------\n\n    [root@support rkhunter-1.3.6]# rkhunter --update  \n    [ Rootkit Hunter version 1.3.6 ]  \n      \n    Checking rkhunter data files...  \n      Checking file mirrors.dat                                  [ No update ]  \n      Checking file programs_bad.dat                             [ No update ]  \n      Checking file backdoorports.dat                            [ No update ]  \n      Checking file suspscan.dat                                 [ No update ]  \n      Checking file i18n/cn                                      [ No update ]  \n      Checking file i18n/de                                      [ No update ]  \n      Checking file i18n/en                                      [ No update ]  \n      Checking file i18n/zh                                      [ No update ]  \n      Checking file i18n/zh.utf8                                 [ No update ]\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n    PKGMGR=RPM\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n    rkhunter --propupd\n\nNow scan your system:\n\n    rkhunter -c\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n*   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n*   You may get warnings like these in `rkhunter.log`:\n\n        Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n```bash\n#!/bin/bash  \n    \nSUSP_FILES=$(cat suspiciousfilelist)  \nlsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"\n```\n\n### Full list of files\n\n    backdoor  \n    adore.o  \n    mod_rootme.so  \n    phide_mod.o  \n    lbk.ko  \n    vlogger.o  \n    cleaner.o  \n    cleaner  \n    ava  \n    tzava  \n    mod_klgr.o  \n    hydra  \n    hydra.restore  \n    ras2xm  \n    vobiscum  \n    sshd3  \n    system  \n    t0rnsb  \n    t0rns  \n    t0rnp  \n    rx4u  \n    rx2me  \n    crontab  \n    sshdu  \n    glotzer  \n    holber  \n    xhide  \n    xh  \n    emech  \n    psybnc  \n    mech  \n    httpd.bin  \n    mh  \n    xl  \n    write  \n    Phantasmagoria.o  \n    lkt.o  \n    nlkt.o\n\nSources\n-------\n\n*   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n*   [rkhunter installation notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n*   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n*   [Detailed Installation and Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n"
    },
    {
      "authorEmail": "mail@nikhil.io",
      "authorName": "Nikhil Anand",
      "date": "2015-12-21T02:30:47Z",
      "id": "d658e80d1ecb97b196531c7b15a0f9af709c05de",
      "shortId": "d658e80d",
      "subject": "Incremental\n",
      "content": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n` ./installer.sh --layout default --install`\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n` INSTALLDIR=/usr/local`  \n` DBDIR=/var/lib/rkhunter/db`  \n` SCRIPTDIR=/usr/local/lib64/rkhunter/scripts`  \n` TMPDIR=/var/lib/rkhunter/tmp`  \n` USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf`\n\nUpdate\n------\n\n` [root@support rkhunter-1.3.6]# rkhunter --update`  \n` [ Rootkit Hunter version 1.3.6 ]`  \n` `  \n` Checking rkhunter data files...`  \n`   Checking file mirrors.dat                                  [ No update ]`  \n`   Checking file programs_bad.dat                             [ No update ]`  \n`   Checking file backdoorports.dat                            [ No update ]`  \n`   Checking file suspscan.dat                                 [ No update ]`  \n`   Checking file i18n/cn                                      [ No update ]`  \n`   Checking file i18n/de                                      [ No update ]`  \n`   Checking file i18n/en                                      [ No update ]`  \n`   Checking file i18n/zh                                      [ No update ]`  \n`   Checking file i18n/zh.utf8                                 [ No update ]`\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n` PKGMGR=RPM`\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n` rkhunter --propupd`\n\nNow scan your system:\n\n` rkhunter -c`\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n-   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n\n<!-- -->\n\n-   You may get warnings like these in `rkhunter.log`:\n\n` Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...`\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n` #!/bin/bash`  \n` `  \n` SUSP_FILES=$(cat suspiciousfilelist)`  \n` lsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"`\n\n### Full list of files\n\n` backdoor`  \n` adore.o`  \n` mod_rootme.so`  \n` phide_mod.o`  \n` lbk.ko`  \n` vlogger.o`  \n` cleaner.o`  \n` cleaner`  \n` ava`  \n` tzava`  \n` mod_klgr.o`  \n` hydra`  \n` hydra.restore`  \n` ras2xm`  \n` vobiscum`  \n` sshd3`  \n` system`  \n` t0rnsb`  \n` t0rns`  \n` t0rnp`  \n` rx4u`  \n` rx2me`  \n` crontab`  \n` sshdu`  \n` glotzer`  \n` holber`  \n` xhide`  \n` xh`  \n` emech`  \n` psybnc`  \n` mech`  \n` httpd.bin`  \n` mh`  \n` xl`  \n` write`  \n` Phantasmagoria.o`  \n` lkt.o`  \n` nlkt.o`\n\nSources\n-------\n\n-   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter\n    Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n-   [rkhunter installation\n    notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n-   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n-   [Detailed Installation and\n    Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n"
    },
    {
      "authorEmail": "mail@nikhil.io",
      "authorName": "Nikhil Anand",
      "date": "2015-12-20T19:56:38Z",
      "id": "db631b8df01ced0879b91973143be8220121728f",
      "shortId": "db631b8d",
      "subject": "RKHunter Notes : v2\n",
      "content": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n` ./installer.sh --layout default --install`\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n` INSTALLDIR=/usr/local`  \n` DBDIR=/var/lib/rkhunter/db`  \n` SCRIPTDIR=/usr/local/lib64/rkhunter/scripts`  \n` TMPDIR=/var/lib/rkhunter/tmp`  \n` USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf`\n\nUpdate\n------\n\n` [root@support rkhunter-1.3.6]# rkhunter --update`  \n` [ Rootkit Hunter version 1.3.6 ]`  \n` `  \n` Checking rkhunter data files...`  \n`   Checking file mirrors.dat                                  [ No update ]`  \n`   Checking file programs_bad.dat                             [ No update ]`  \n`   Checking file backdoorports.dat                            [ No update ]`  \n`   Checking file suspscan.dat                                 [ No update ]`  \n`   Checking file i18n/cn                                      [ No update ]`  \n`   Checking file i18n/de                                      [ No update ]`  \n`   Checking file i18n/en                                      [ No update ]`  \n`   Checking file i18n/zh                                      [ No update ]`  \n`   Checking file i18n/zh.utf8                                 [ No update ]`\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n` PKGMGR=RPM`\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n` rkhunter --propupd`\n\nNow scan your system:\n\n` rkhunter -c`\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n-   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n\n<!-- -->\n\n-   You may get warnings like these in `rkhunter.log`:\n\n` Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...`\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n` #!/bin/bash`  \n` `  \n` SUSP_FILES=$(cat suspiciousfilelist)`  \n` lsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"`\n\n### Full list of files\n\n` backdoor`  \n` adore.o`  \n` mod_rootme.so`  \n` phide_mod.o`  \n` lbk.ko`  \n` vlogger.o`  \n` cleaner.o`  \n` cleaner`  \n` ava`  \n` tzava`  \n` mod_klgr.o`  \n` hydra`  \n` hydra.restore`  \n` ras2xm`  \n` vobiscum`  \n` sshd3`  \n` system`  \n` t0rnsb`  \n` t0rns`  \n` t0rnp`  \n` rx4u`  \n` rx2me`  \n` crontab`  \n` sshdu`  \n` glotzer`  \n` holber`  \n` xhide`  \n` xh`  \n` emech`  \n` psybnc`  \n` mech`  \n` httpd.bin`  \n` mh`  \n` xl`  \n` write`  \n` Phantasmagoria.o`  \n` lkt.o`  \n` nlkt.o`\n\nSources\n-------\n\n-   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter\n    Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n-   [rkhunter installation\n    notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n-   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n-   [Detailed Installation and\n    Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n\n[Category:Installation Logs](Category:Installation_Logs \"wikilink\")\n[Category:Nikhil's Notes](Category:Nikhil's_Notes \"wikilink\")\n[Category:From a past sysadmin\nlife](Category:From_a_past_sysadmin_life \"wikilink\")\n"
    },
    {
      "authorEmail": "mail@nikhil.io",
      "authorName": "Nikhil Anand",
      "date": "2015-12-20T19:56:38Z",
      "id": "2d92d03e0e365fcdeb3ee0f11b99210ca0fc121a",
      "shortId": "2d92d03e",
      "subject": "RKHunter Notes : First Draft\n",
      "content": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n` ./installer.sh --layout default --install`\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n` INSTALLDIR=/usr/local`  \n` DBDIR=/var/lib/rkhunter/db`  \n` SCRIPTDIR=/usr/local/lib64/rkhunter/scripts`  \n` TMPDIR=/var/lib/rkhunter/tmp`  \n` USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf`\n\nUpdate\n------\n\n` [root@support rkhunter-1.3.6]# rkhunter --update`  \n` [ Rootkit Hunter version 1.3.6 ]`  \n` `  \n` Checking rkhunter data files...`  \n`   Checking file mirrors.dat                                  [ No update ]`  \n`   Checking file programs_bad.dat                             [ No update ]`  \n`   Checking file backdoorports.dat                            [ No update ]`  \n`   Checking file suspscan.dat                                 [ No update ]`  \n`   Checking file i18n/cn                                      [ No update ]`  \n`   Checking file i18n/de                                      [ No update ]`  \n`   Checking file i18n/en                                      [ No update ]`  \n`   Checking file i18n/zh                                      [ No update ]`  \n`   Checking file i18n/zh.utf8                                 [ No update ]`\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n` PKGMGR=RPM`\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n` rkhunter --propupd`\n\nNow scan your system:\n\n` rkhunter -c`\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n-   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n\n<!-- -->\n\n-   You may get warnings like these in `rkhunter.log`:\n\n` Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...`\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n` #!/bin/bash`  \n` `  \n` SUSP_FILES=$(cat suspiciousfilelist)`  \n` lsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"`\n\n### Full list of files\n\n` backdoor`  \n` adore.o`  \n` mod_rootme.so`  \n` phide_mod.o`  \n` lbk.ko`  \n` vlogger.o`  \n` cleaner.o`  \n` cleaner`  \n` ava`  \n` tzava`  \n` mod_klgr.o`  \n` hydra`  \n` hydra.restore`  \n` ras2xm`  \n` vobiscum`  \n` sshd3`  \n` system`  \n` t0rnsb`  \n` t0rns`  \n` t0rnp`  \n` rx4u`  \n` rx2me`  \n` crontab`  \n` sshdu`  \n` glotzer`  \n` holber`  \n` xhide`  \n` xh`  \n` emech`  \n` psybnc`  \n` mech`  \n` httpd.bin`  \n` mh`  \n` xl`  \n` write`  \n` Phantasmagoria.o`  \n` lkt.o`  \n` nlkt.o`\n\nSources\n-------\n\n-   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter\n    Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n-   [rkhunter installation\n    notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n-   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n-   [Detailed Installation and\n    Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n\n[Category:Installation Logs](Category:Installation_Logs \"wikilink\")\n[Category:Knowledgebase\nArticles](Category:Knowledgebase_Articles \"wikilink\") [Category:Nikhil's\nNotes](Category:Nikhil's_Notes \"wikilink\") [Category:From a past\nsysadmin life](Category:From_a_past_sysadmin_life \"wikilink\")\n"
    }
  ],
  "sizeInBytes": 3867,
  "source": "Installation\n------------\n\n[Download the tarball](http://sourceforge.net/projects/rkhunter/files/),\nextract it, and:\n\n    ./installer.sh --layout default --install\n\nYou can also specify `--layout RPM` instead and create an RPM. However,\nyou will need to export a value for the `$RPM_BUILD_ROOT` variable.\n`rkhunter` installs itself as follows (on a 64-bit machine):\n\n    INSTALLDIR=/usr/local  \n    DBDIR=/var/lib/rkhunter/db  \n    SCRIPTDIR=/usr/local/lib64/rkhunter/scripts  \n    TMPDIR=/var/lib/rkhunter/tmp  \n    USER_FILEPROP_FILES_DIRS=/etc/rkhunter.conf\n\nUpdate\n------\n\n    [root@support rkhunter-1.3.6]# rkhunter --update  \n    [ Rootkit Hunter version 1.3.6 ]  \n      \n    Checking rkhunter data files...  \n      Checking file mirrors.dat                                  [ No update ]  \n      Checking file programs_bad.dat                             [ No update ]  \n      Checking file backdoorports.dat                            [ No update ]  \n      Checking file suspscan.dat                                 [ No update ]  \n      Checking file i18n/cn                                      [ No update ]  \n      Checking file i18n/de                                      [ No update ]  \n      Checking file i18n/en                                      [ No update ]  \n      Checking file i18n/zh                                      [ No update ]  \n      Checking file i18n/zh.utf8                                 [ No update ]\n\nConfigure\n---------\n\nEdit `/etc/rkhunter.conf` and make sure you have the package manager set\nto RPM:\n\n    PKGMGR=RPM\n\nNow create the properties file. *It is **vitally** important to do this\non a system you're **sure** hasn't been compromised.*\n\n    rkhunter --propupd\n\nNow scan your system:\n\n    rkhunter -c\n\nThe output is sent to `/var/log/rkhunter.log`.\n\nOther stuff\n-----------\n\n*   In case you're warned about scripts, files and directories which you\n    *know* are okay, you can whitelist them with `SCRIPTWHITELIST`,\n    `ALLOWHIDDENFILE`, and `ALLOWHIDDENDIR` respectively in\n    `rkhunter.conf`.\n*   You may get warnings like these in `rkhunter.log`:\n\n        Warning: One or more of these files were found: backdoor, adore.o, mod_rootme.so...\n\nThis may or may not be innocuous, so it's best to check. Use the files\nbelow.\n\n### Quick checker script\n\n```bash\n#!/bin/bash  \n    \nSUSP_FILES=$(cat suspiciousfilelist)  \nlsof -F n -w -n | grep '^n/' | sed -e 's/^n//' | sort | uniq | grep \"$SUSP_FILES\"\n```\n\n### Full list of files\n\n    backdoor  \n    adore.o  \n    mod_rootme.so  \n    phide_mod.o  \n    lbk.ko  \n    vlogger.o  \n    cleaner.o  \n    cleaner  \n    ava  \n    tzava  \n    mod_klgr.o  \n    hydra  \n    hydra.restore  \n    ras2xm  \n    vobiscum  \n    sshd3  \n    system  \n    t0rnsb  \n    t0rns  \n    t0rnp  \n    rx4u  \n    rx2me  \n    crontab  \n    sshdu  \n    glotzer  \n    holber  \n    xhide  \n    xh  \n    emech  \n    psybnc  \n    mech  \n    httpd.bin  \n    mh  \n    xl  \n    write  \n    Phantasmagoria.o  \n    lkt.o  \n    nlkt.o\n\nSources\n-------\n\n*   [Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter Software](http://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/)\n*   [rkhunter installation notes](http://oesediez.blogspot.com/2008/06/installing-rootkit-hunter-on-centos-5.html)\n*   [rkhunter RPMs on sw.be](http://packages.sw.be/rkhunter/)\n*   [Detailed Installation and Configuration](http://sourceforge.net/apps/trac/rkhunter/wiki/SPRKH)\n",
  "title": "RKHunter Notes",
  "untracked": false,
  "uri": "/RKHunter_Notes",
  "relativePath": "RKHunter Notes.md"
}
