Unhide: Unterschied zwischen den Versionen
Die Seite wurde neu angelegt: „'''unhide''' - forensic tool to find hidden processes and ports Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp. unhide detects hidden processes using the following six techniques: * Compare /proc vs /bin/ps output * Compare info gathered from /bin/ps with info gathered by walking thru the procfs. * Compare info gathered…“ |
Keine Bearbeitungszusammenfassung |
||
Zeile 3: | Zeile 3: | ||
Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp. | Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp. | ||
unhide detects hidden processes using the following six techniques: | ; unhide detects hidden processes using the following six techniques: | ||
* Compare /proc vs /bin/ps output | |||
* Compare info gathered from /bin/ps with info gathered by walking thru the procfs. | |||
* Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning). | |||
* Full PIDs space occupation (PIDs bruteforcing) | |||
* Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall) | |||
* Quick compare /proc, procfs walking and syscall vs /bin/ps output | |||
unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available. | unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available. |
Aktuelle Version vom 17. Februar 2024, 10:59 Uhr
unhide - forensic tool to find hidden processes and ports
Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp.
- unhide detects hidden processes using the following six techniques
- Compare /proc vs /bin/ps output
- Compare info gathered from /bin/ps with info gathered by walking thru the procfs.
- Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
- Full PIDs space occupation (PIDs bruteforcing)
- Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall)
- Quick compare /proc, procfs walking and syscall vs /bin/ps output
unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
This package can be used by rkhunter in its daily scans.
This package is useful for network security checks, in addition to forensics investigations.