![]() |
|
Alles rund um Mac OSX & Linux: Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42Windows 7 Für alle Fragen rund um Mac OSX, Linux und andere Unix-Derivate. |
![]() |
|
![]() | #1 |
/// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42 Du hast doch bestimtm noch andere Rechner mit Windows oder? Da würde ich mal zuerst Ursachenforschung betreiben und nicht auf einem Linux-PC.
__________________ Logfiles bitte immer in CODE-Tags posten ![]() |
![]() | #2 | |
| ![]() Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42Zitat:
![]() |
![]() | #3 |
/// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42 Ok, dein Internetanschluss wird aber mit dynamisch WAN-IP versorgt oder?
__________________![]()
__________________ |
![]() | #4 |
![]() ![]() ![]() ![]() | ![]() Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42 Also 41 der 42 Einträge scheinen diese zu sein: Code:
ATTFilter [20:50:20] File: /usr/sbin/chroot [20:50:23] File: /usr/bin/basename [20:50:24] File: /usr/bin/cut [20:50:24] File: /usr/bin/dirname [20:50:25] File: /usr/bin/du [20:50:25] File: /usr/bin/env [20:50:26] File: /usr/bin/groups [20:50:26] File: /usr/bin/head [20:50:26] File: /usr/bin/id [20:50:28] File: /usr/bin/md5sum [20:50:29] File: /usr/bin/runcon [20:50:30] File: /usr/bin/sha1sum [20:50:30] File: /usr/bin/sha224sum [20:50:30] File: /usr/bin/sha256sum [20:50:31] File: /usr/bin/sha384sum [20:50:31] File: /usr/bin/sha512sum [20:50:31] File: /usr/bin/sort [20:50:32] File: /usr/bin/stat [20:50:32] File: /usr/bin/tail [20:50:32] File: /usr/bin/test [20:50:33] File: /usr/bin/touch [20:50:33] File: /usr/bin/tr [20:50:33] File: /usr/bin/uniq [20:50:34] File: /usr/bin/users [20:50:34] File: /usr/bin/wc [20:50:35] File: /usr/bin/who [20:50:35] File: /usr/bin/whoami [20:50:40] File: /bin/cat [20:50:40] File: /bin/chmod [20:50:40] File: /bin/chown [20:50:40] File: /bin/cp [20:50:41] File: /bin/date [20:50:41] File: /bin/df [20:50:42] File: /bin/echo [20:50:43] File: /bin/ls [20:50:44] File: /bin/mktemp [20:50:44] File: /bin/mv [20:50:45] File: /bin/pwd [20:50:45] File: /bin/readlink [20:50:46] File: /bin/touch [20:50:46] File: /bin/uname Code:
ATTFilter [20:50:20] Current hash: 8494af77719654704445c03826606674d47f8034 [20:50:20] Stored hash : 877ef64429a0a96b18a270b81125bbc13d7d1b03 [20:50:20] Current inode: 1978484 Stored inode: 1964056 [20:50:20] Current file modification time: 1449162951 (03-Dez-2015 18:15:51) [20:50:20] Stored file modification time : 1421207424 (14-Jan-2015 04:50:24) Am 03.12.2015 gab es z.B. ein Update von "coreutils" wo auch /usr/sbin/chroot zugehört. http://security.ubuntu.com/ubuntu/po...n/c/coreutils/ Dateien: coreutils_8.21-1ubuntu5.3_amd64.deb coreutils_8.21-1ubuntu5.3_i386.deb Installiere mal "debsums". Was sagt Code:
ATTFilter debsums coreutils debsums coreutils |grep chroot Geändert von iceweasel (21.01.2016 um 13:34 Uhr) |
![]() |
Themen zu Ubuntu Trusty - IP- Bannend - rkhunter Suspect files: 42 |
angemeldet, code, detected, files, folge, found, installation, linux, netstat, not, opera, process, rootkit, rootkits, scanning, seite, seiten, shell, start, symbol, system, trojan, ubuntu, variant, version |