chkrootkit
chkrootkit(8) System Manager's Manual chkrootkit(8)
NAME
chkrootkit - Scan the system for signs of rootkits
SYNOPSIS
chkrootkit [OPTION]... [TESTNAME]...
DESCRIPTION
chkrootkit examines the target system for signs that it has been tam-
pered with. Some tools which chkrootkit uses can be found in
/usr/lib/chkrootkit.
OPTIONS
Unlike usual programmes, options cannot be 'combined', so you cannot
need to write '-q -n' instead of '-qn'
-q Enter quiet mode. This suppresses output of tests that find
nothing suspicious.
-x Enter expert mode. This makes many tests produces additional
output showing what they have found.
-d Enter debug mode. This shows exactly what chkrootkit is doing at
every step (it includes running chkrootkit with 'set -x').
-e "FILE1[ FILE2...]"
Exclude listed files from the results of some tests. The list
should be pace-separated (which will generally require quoting
when run from a shell. You can also specify -e several times).
Use this to remove false positives from the result of many tests
- see /usr/share/doc/chkrootkit/README.FALSE-POSITIVES.
-s REGEXP
Similar to -e but only applies to the result of the sniffer
test. This test will flag standard network managers like sys-
temd-networkd(1), NetworkManager(1) or wpa_supplicant(1) as
PACKET SNIFFER s, and you can remove such messages from the out-
put with something like chkrootkit -s '(systemd-netword|Network-
Manager|wpa_supplicant)', where the argument lists whicher man-
agers you expect to be present. The argument can be any regular
expression understood by egrep(1).
-p DIR1[:DIR2...]
Specify an alternative $PATH. chkrootkit assumes that standard
programmes, like find(1) andgrep(1), are uncompromised. The in-
tention is that you place trusted copies where they cannot be
modified and invoke with something like chkrootkit -p /media/usb
-r DIR Use DIR as the root directory. For example, you might mount
a disk on an uncompromised system and run chkrootkit-r/mnt
-n make some tests ignore NFS-mounted directories.
-l Print available tests. These are the following:
aliens asp bindshell lkm rexedcs sniffer w55808 wted scalper
slapper z2 chkutmp OSX_RSPLUG amd basename biff chfn chsh cron
crontab date du dirname echo egrep env find fingerd gpm grep hd-
parm su ifconfig inetd inetdconf identd init killall ldso-
preload login ls lsof mail mingetty netstat named passwd pidof
pop2 pop3 ps pstree rpcinfo rlogind rshd slogin sendmail sshd
syslogd tar tcpd tcpdump top telnetd timed traceroute vdir w
write
-h Print a short help message and exit.
-V Print version information and exit.
AUTHOR
Manual page written by Yotam Rubin <yotam@makif.omer.k12.il>, Marcos
Fouces <marcos@debian.org> and lantz moore <lmoore@debian.org> for the
Debian project. It may be used by others.
SEE ALSO
strings(1) chklastlog(8) chkwtmp(8)
Oct 23, 2021 chkrootkit(8)
Man Pages Copyright Respective Owners. Site Copyright (C) 1994 - 2025
Hurricane Electric.
All Rights Reserved.