unix and linux operating commands

Rootkit detection and protection products and sites


 
Thread Tools Search this Thread
# 1  
Old 01-12-2009
Rootkit detection and protection products and sites

The term "rootkit" is a difficult one to define, or at least fix a definition on.  Originally it referred to a script, set of scripts, or package of modified system programs (thus "kit") used for gaining or keeping unauthorized root permissions (or equivalent supervisory powers) on a compromised system. Recently, media usage has expanded this definition to include any software that can hide software or processes on a system, but this usage is vague and likely to lead to confusion.

Antirootkit.com doesn't have an awful lot of information on the site, but it does have a list of rootkit detection software.  There are brief descriptions of the products.  Be careful of the download links: they can be misleading in terms of what you are actually getting.

Sophos has always been a solid antivirus company, so there is no reason to think that their anti-rootkit product is any less.

GMER is a Polish anti-rootkit program (Windows only) available for free download.

McAfee Rootkit Detective (originally from Avert) is available for download, but the McAfee site makes sure you know it is a beta product, and requires knowledgeable application and use.

Panda tends to oversell their products, but their anti-rootkit is also available for download.

As usual with most Trend Micro products, RootkitBuster sounds fairly agressive.

F-Secure's BlackLight Rootkit Elimination Technology is well-regarded in the anti-malware research community.  It is available in their complete product, but can also be downloaded separately as a utility.  F-Secure also provides a little bit of rootkit explanation.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Solaris

rootkit detector?

Is there a foolproof way of detecting viruses and such on (SPARC) Solaris10? I'm thinking about a whitelist of hashes of all executable files or similar. (1 Reply)
Discussion started by: orange47
1 Replies

2. Programming

Parallel Processing Detection and Program Return Value Detection

Hey, for the purpose of a research project I need to know if a specific type of parallel processing is being utilized by any user-run programs. Is there a way to detect whether a program either returns a value to another program at the end of execution, or just utilizes any form of parallel... (4 Replies)
Discussion started by: azar.zorn
4 Replies

3. Linux

which linux products is used(fine) to me ?

which linux products is used(fine) to me ? I am learning linux now ,and a new memeber of linux ,hoping to know it more . (4 Replies)
Discussion started by: lsxymn
4 Replies
Login or Register to Ask a Question