Quote:
1. CHKRootKit - a simple program that detects hacker software and notifies you if any has been detected via email
2. RootKit Hunter - scanning tool to ensure your system does not have any backdoors or exploits
ASL includes this, sets it up, cooks the results and includes an advanced rootkit detection system, as well as real time root kit detection and prevention.
I have an issue because I just received and e-mail and need to know how to proceed:
--------------------- Start Rootkit Hunter Update ---------------------
[ Rootkit Hunter version 1.4.0 ]
Checking rkhunter data files...
Checking file mirrors.dat [ No update ]
Checking file programs_bad.dat [ No update ]
Checking file backdoorports.dat [ No update ]
Checking file suspscan.dat [ No update ]
Checking file i18n/cn [ No update ]
Checking file i18n/de [ No update ]
Checking file i18n/en [ No update ]
Checking file i18n/zh [ No update ]
Checking file i18n/zh.utf8 [ No update ]
---------------------- Start Rootkit Hunter Scan ----------------------
Warning: Package manager verification has failed:
File: /bin/mount
The file permissions have changed
Warning: Package manager verification has failed:
File: /bin/ping
The file permissions have changed
Warning: Package manager verification has failed:
File: /bin/su
The file permissions have changed
The file group has changed
Warning: Package manager verification has failed:
File: /usr/bin/locate
The file permissions have changed
Warning: Package manager verification has failed:
File: /usr/bin/newgrp
The file permissions have changed
Warning: Hidden ports found:
Port number: TCP:631
Warning: Unable to check for passwd file differences: no copy of the passwd file exists.
Warning: Unable to check for group file differences: no copy of the group file exists.
Warning: The SSH configuration option 'PermitRootLogin' has not been set.
The default value may be 'yes', to allow root access.
Warning: Suspicious file types found in /dev:
/dev/.udev/db/input:event4: ASCII text
/dev/.udev/db/input:event0: ASCII text
/dev/.udev/db/input:js0: ASCII text
/dev/.udev/db/input:event3: ASCII text
/dev/.udev/db/input
/dev/.udev/db/input:event1: ASCII text
/dev/.udev/db/input:event2: ASCII text
/dev/.udev/db/input:mouse1: ASCII text
/dev/.udev/db/net:eth1: ASCII text
/dev/.udev/db/net:eth0: ASCII text
/dev/.udev/db/usb:1-2: ASCII text
/dev/.udev/db/usb:usb1: ASCII text
/dev/.udev/db/serio:serio0: ASCII text
----------------------- End Rootkit Hunter Scan -----------------------
How do I take care of this as I was told that asl would detect and prevent? Could this also be the results of the high load on my server as well?
Thanks,
Shawn Mulligan