Why
chkrootkit is another tool for detecting rootkits on Linux systems. It provides an additional layer of security when used alongside other rootkit detectors like rkhunter. Multiple scanning tools can catch threats that others might miss.How It Works
chkrootkit checks for signs of rootkits by:- Examining system binaries for rootkit signatures
- Looking for suspicious strings and patterns
- Checking for hidden processes and files
- Detecting packet sniffers
- Identifying commonly infected files
Goals
- chkrootkit installed and configured to scan daily
- Automatic email notifications of scan results
References
- http://www.chkrootkit.org/
- https://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/
- https://askubuntu.com/questions/258658/eth0-packet-sniffer-sbin-dhclient
Installation and Setup
Understanding Results
When chkrootkit finds something suspicious, it will report it. Common findings include:- not found - The file or program doesn’t exist on your system (normal)
- not infected - The file was checked and appears clean
- INFECTED - Potential rootkit detected (investigate immediately)
- nothing deleted - No suspicious entries found in log files
Some legitimate programs may trigger false positives. For example, DHCP client (
dhclient) is sometimes flagged as a packet sniffer because it monitors network traffic for DHCP responses. This is normal behavior.False Positives
The most common false positive is:dhclient being a packet sniffer is generally a false positive, as DHCP clients need to monitor network packets to function properly.
Manual Scanning Options
Run chkrootkit with specific checks:man chkrootkit for more options.