Entrada

Seguridad en Linux. Instalar chkrootkit

Un rootkit es una herramienta, o un grupo de ellas que tiene como finalidad esconderse a sí misma y esconder otros programas, procesos, archivos, directorios, claves de registro, y puertos que permiten al intruso mantener el acceso a un sistema para remotamente comandar acciones o extraer información sensible. Existen rootkits para una amplia variedad de sistemas operativos, como GNU/Linux, Solaris o Microsoft Windows.

Hay varios programas disponibles para detectar rootkits. En los sistemas basados en Unix, dos de las aplicaciones más populares son chkrootkit y rkhunter.

Chkrootkit se encuentra en los repos de fedora, así que para instalarlo es muy sencillo:

1
# yum install chkrootkit

Después lanzamos chkrootkit. Ejecutándolo desde consola

1
# chkrootkit

También se puede ejecutar desde el entorno gráfico en Aplicaciones > Herramientas del sistema > chkrootkit

Lo que se devuelve por pantalla es algo similar a esto:

ROOTDIR is /' Checking amd’… not found Checking basename'... not infected Checking biff’… not found Checking chfn'... not infected Checking chsh’… not infected Checking cron'... not infected Checking crontab’… not infected Checking date'... not infected Checking du’… not infected Checking dirname'... not infected Checking echo’… not infected Checking egrep'... not infected Checking env’… not infected Checking find'... not infected Checking fingerd’… not found Checking gpm'... not found Checking grep’… not infected Checking hdparm'... not infected Checking su’… not infected Checking ifconfig'... not infected Checking inetd’… not found Checking inetdconf'... not found Checking identd’… not found Checking init'... not infected Checking killall’… not infected Checking ldsopreload'... not infected Checking login’… not infected Checking ls'... not infected Checking lsof’… not infected Checking mail'... not found Checking mingetty’… not infected Checking netstat'... not infected Checking named’… not found Checking passwd'... not infected Checking pidof’… not infected Checking pop2'... not found Checking pop3’… not found Checking ps'... not infected Checking pstree’… not infected Checking rpcinfo'... not found Checking rlogind’… not found Checking rshd'... not found Checking slogin’… not infected Checking sendmail'... not infected Checking sshd’… not infected Checking syslogd'... not tested Checking tar’… not infected Checking tcpd'... not infected Checking tcpdump’… not infected Checking top'... not infected Checking telnetd’… not found Checking timed'... not found Checking traceroute’… not infected Checking vdir'... not infected Checking w’… not infected Checking write'... not infected Checking aliens’… no suspect files Searching for sniffer’s logs, it may take a while… nothing found Searching for HiDrootkit’s default dir… nothing found Searching for t0rn’s default files and dirs… nothing found Searching for t0rn’s v8 defaults… nothing found Searching for Lion Worm default files and dirs… nothing found Searching for RSHA’s default files and dir… nothing found Searching for RH-Sharpe’s default files… nothing found Searching for Ambient’s rootkit (ark) default files and dirs… nothing found Searching for suspicious files and dirs, it may take a while… /usr/lib/.libfipscheck.so.1.hmac /usr/lib/.libssl.so.1.0.0c.hmac /usr/lib/.libfipscheck.so.1.1.0.hmac /usr/lib/.libssl.so.10.hmac /usr/lib/firefox-3.6/.autoreg /lib/.libcrypto.so.10.hmac /lib/.libcrypto.so.1.0.0c.hmac /lib/.libgcrypt.so.11.hmac

Searching for LPD Worm files and dirs… nothing found Searching for Ramen Worm files and dirs… nothing found Searching for Maniac files and dirs… nothing found Searching for RK17 files and dirs… nothing found Searching for Ducoci rootkit… nothing found Searching for Adore Worm… nothing found Searching for ShitC Worm… nothing found Searching for Omega Worm… nothing found Searching for Sadmind/IIS Worm… nothing found Searching for MonKit… nothing found Searching for Showtee… nothing found Searching for OpticKit… nothing found Searching for T.R.K… nothing found Searching for Mithra… nothing found Searching for LOC rootkit… nothing found Searching for Romanian rootkit… nothing found Searching for HKRK rootkit… nothing found Searching for Suckit rootkit… nothing found Searching for Volc rootkit… nothing found Searching for Gold2 rootkit… nothing found Searching for TC2 Worm default files and dirs… nothing found Searching for Anonoying rootkit default files and dirs… nothing found Searching for ZK rootkit default files and dirs… nothing found Searching for ShKit rootkit default files and dirs… nothing found Searching for AjaKit rootkit default files and dirs… nothing found Searching for zaRwT rootkit default files and dirs… nothing found Searching for Madalin rootkit default files… nothing found Searching for Fu rootkit default files… nothing found Searching for ESRK rootkit default files… nothing found Searching for rootedoor… nothing found Searching for ENYELKM rootkit default files… nothing found Searching for common ssh-scanners default files… nothing found Searching for anomalies in shell history files… Warning: //root/.mysql_history' file size is zero Checking asp’… not infected Checking bindshell'... not infected Checking lkm’… chkproc: nothing detected chkdirs: nothing detected Checking rexedcs'... not found Checking sniffer’… eth0: PF_PACKET(/sbin/dhclient) Checking w55808'... not infected Checking wted’… chkwtmp: nothing deleted Checking scalper'... not infected Checking slapper’… not infected Checking z2'... chklastlog: nothing deleted Checking chkutmp’… chkutmp: nothing deleted Checking `OSX_RSPLUG’… not infected

Esta entrada está licenciada bajo CC BY 4.0 por el autor.