Unhide: Unterschied zwischen den Versionen

Aus Foxwiki
Die Seite wurde neu angelegt: „'''unhide''' - forensic tool to find hidden processes and ports Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp. unhide detects hidden processes using the following six techniques: * Compare /proc vs /bin/ps output * Compare info gathered from /bin/ps with info gathered by walking thru the procfs. * Compare info gathered…“
 
Keine Bearbeitungszusammenfassung
 
Zeile 3: Zeile 3:
Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp.
Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp.


unhide detects hidden processes using the following six techniques:
; unhide detects hidden processes using the following six techniques:
  * Compare /proc vs /bin/ps output
* Compare /proc vs /bin/ps output
  * Compare info gathered from /bin/ps with info gathered by walking thru the procfs.
* Compare info gathered from /bin/ps with info gathered by walking thru the procfs.
  * Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
* Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
  * Full PIDs space occupation (PIDs bruteforcing)
* Full PIDs space occupation (PIDs bruteforcing)
  * Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall)
* Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall)
  * Quick compare /proc, procfs walking and syscall vs /bin/ps output
* Quick compare /proc, procfs walking and syscall vs /bin/ps output


unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.

Aktuelle Version vom 17. Februar 2024, 10:59 Uhr

unhide - forensic tool to find hidden processes and ports

Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits, Linux kernel modules or by other techniques. It includes two utilities: unhide and unhide-tcp.

unhide detects hidden processes using the following six techniques
  • Compare /proc vs /bin/ps output
  • Compare info gathered from /bin/ps with info gathered by walking thru the procfs.
  • Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
  • Full PIDs space occupation (PIDs bruteforcing)
  • Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall)
  • Quick compare /proc, procfs walking and syscall vs /bin/ps output

unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.

This package can be used by rkhunter in its daily scans.

This package is useful for network security checks, in addition to forensics investigations.