lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <945d9cc8040830164862cc6c3b@mail.gmail.com> From: da.m0nk3y at gmail.com (da m0nk3y) Subject: Using rkhunter ["As Seen On Full-Disclosure"] First of I would like to explain the first reason of this short solicitation e-mail. As most of you know a major part of subscribers to this mailling list are system administrators using full-disclosure as a tool to stay up to date on security. For many system administrators it is not always easy to analyse such security tools. For purpose consult `http://www.rkhunter.org/projects/rootkit_hunter.html`. ROOT KIT HUNTER is a very reliable tool because it uses many advanced methodes to hunt inside your system for signs of rootkits. A good thing in root kit hunter is it does not look for specific signs but also unspecific signs that is very very advanced say compared to tripwire or even chkrootkit. It comes with an installer so it's very user-friendly. That's also a plus. 55808 http://www.intrusec.com/55808.html OVERALL: RKHUNTER is a very good tool but do not let people know you use it because you may look stupid because it can replace most security professionals with at the cost of a dot slash. No wonder why that " Sponsored by: ? Buy me a book and get your company on this place! ? " banner has been idling on rkhunter.org for months. The trick of real hackers: chkrootkit + rkhunter + porn Keep up the good work.