Applications/System

rkhunter - A host-based tool to scan for rootkits, backdoors and local exploits

Rootkit Hunter scans files and systems for known and unknown rootkits,
backdoors, and sniffers.  The package contains one shell script, a few
text-based databases, and optional Perl modules.  It should run on almost
every Unix clone.  This tool scans for rootkits, backdoors and local
exploits by running tests like:
        - MD5 hash compare
        - Look for default files used by rootkits
        - Wrong file permissions for binaries
        - Look for suspected strings in LKM and KLD modules
        - Look for hidden files
        - Optional scan within plaintext and binary files
        - Software version checks
        - Application tests

Rootkit Hunter is released as a GPL licensed project and
is free for everyone to use.
License:GPL Group:Applications/System
URL:http://www.rootkit.nl/

Packages

Name Version Release Type Size Built
rkhunter 1.2.8 3.fc5 src 146 KiB Sat Mar 18 22:50:14 2006

Changelog

* Sat Mar 18 17:00:00 2006 Greg Houlette <tamaster{%}pobox{*}com> - 1.2.8-3
- Made an RPM transparent change to move the sha1 canary check
  file out of CVS and into the external lookaside cache (whose
  filename changes with every new package release anyway...)
* Fri Mar 17 17:00:00 2006 Greg Houlette <tamaster{%}pobox{*}com> - 1.2.8-2
- Fixed architectural dependency during package creation eliminating
  use of _libdir configure macro (x86_64 /usr/lib64 mis-targeting)
* Tue Mar 7 17:00:00 2006 Greg Houlette <tamaster{%}pobox{*}com> - 1.2.8-1
- New package version release
- reworked the .spec file to support optional dist tag
- Updated the application check default patchfile (chunk failure)
- Changed to SHA1 for optional message digest (canary check)
- Added a couple of suggested skip entries to rkhunter.conf

Listing created by RepoView-0.5.2-1.fc6 (modified)