File properties check... Required commands check failed Files checked: 157 Suspect files: 157 Rootkits checked.... Rootkits checked: 500 Possible rootkits: 4 I ran the test 5 times... I get the same results. I get the same warrnings as shown on the video. Tried to update ... Invalid WEB_CMD configuration option: Relative pathname: "/bin/false"
wow i was searching for rootkit and luckily i found your video thank you you are awsome and a very good teacher and creating such content for free god bless you my friend all the best you definitely reach 1 million subscribers in future very soon
Many thanks for this tutorial, even applying isn't easy for me. Cause I just discover Kali-linux and think the way has to be long for me. But I so appreciate it. Your explaination is good and clear. Merci énormément.
Hy their iam using Linux Mint from an USB Stick couse my Laptop is infected with something since a long time. And i get the Error INVALID SCRIPTWHITELIST configuration option: Non-existent pathname: /usr/bin/egrep & fgrep !!! How can i Fix this ?
Hi hackersploit:when you download root kit, wouldn't that leave you to an open backdoor to own computer and how do you contain it n how fix all the warning sign.
Hey bud. Thanks for so much for all the amazing videos you post. Learnt so much and pass on my knowledge learnt from you to friend who are in the same field. Your are in my top 3 UA-camrs and trust me I have a lot lol. Keep up the good work and keep them coming. Take care and stay safe. If only this would take away Covid-19
There should be more videos on defending against these attacks. Hopefully in the future you make more demonstration videos in taking actions on an exploited OS
please create a video how to successfully attack wordpress if they are vulnerable .since most website use wordpress as a content management.hope u ll create.....
Hello my friend, what you should have shown in thus video is how to detect root kits on remote or external systems , that would have been more useful instead !😎
I was very happy to c ur video on root kit detection. I 2as wondering if u can make a few videos maybe even a series of videos on malware analysis. For instance I get a pdf in my email and I wanna check it to see if it is safe,by opening the file and looking at its contents. (In kali) The goal would be to get a better understanding of malware and how to detect it.
Okay. Some good stuff you have here. When u speak about backdoors and rootkits, a few details I need cleared. Would I be right in saying that rootkit is on the root level whereas backdoor are in code level like say PHP?
So I'm a new Linux user running Mint 19.1 Mate and I just downloaded this program and ran it once. It said I had 11 possible rootkits. Can you explain the course of action to take when that happens? Like, how do I get rid of them if I need to, it seems RKhunter is more for just telling me they're there rather than doing anything about them which is fine, I just need to know what I need to do. Do I have to manually go to each folder, inspect the file and delete it by hand or what?
The irony is that a rootkit could manipulate the chkrootkit program in a way that it hides the rootkit. You would have to use a live Linux system and chroot into the target system.
Can anyone help me with the apache2 error. When i try to start apache2 ,it gives me error: Job for apache2.service failed because the control process exited with error code. Now tell me what to do? Every time I have to reinstall apache2 to overcome this problem. Please give me a sustainable solution.
hi hacker sploit, i have this one /usr/bin/vendor_perl/GET /usr/bin/ldd usr/bin/fgrep /usr/bin/egrep Checking for prerequisites Checking for suspicious (large) shared memory segment Checking for hidden files and directorie warnings
The problem about chkrootkit and rkhunter is that they are restricted to a few previously known rootkits. That will never work against NSA surveillance! - look out for a better tool: www.elstel.org/debcheckroot/
I’m taking a+ 902 right now, and the information in the course is laughable. I haven’t had to study once. Never has the course mentioned anything more complex than a VM.
I have a compromised server with ".resyslogd" According to this post askubuntu.com/a/718836 rkhunter cannot be installed in a compromised system, but based on your video seems that it is able to detect the threat. Any suggestions? Thanks!
Hey man, I just want to thank you for all your effort you put into these videos! You are by far my favorite youtuber! Youre awesome
Thank you very much for the support.
Late to the party, but I fully agree! Really enjoy your videos!
Even later to the party but I’m on board with this too lol
@@programmerxix7129 extremely late for the party and found this video for the first time but sick tutorial!
File properties check...
Required commands check failed
Files checked: 157
Suspect files: 157
Rootkits checked....
Rootkits checked: 500
Possible rootkits: 4
I ran the test 5 times... I get the same results.
I get the same warrnings as shown on the video.
Tried to update ...
Invalid WEB_CMD configuration option: Relative pathname: "/bin/false"
Always appreciated your work, today again you proved why you holds the best channel over cyber security over UA-cam
Thank you very much, I appreciate it.
wow i was searching for rootkit and luckily i found your video thank you you are awsome and a very good teacher and creating such content for free god bless you my friend all the best you definitely reach 1 million subscribers in future very soon
Many thanks for this tutorial, even applying isn't easy for me. Cause I just discover Kali-linux and think the way has to be long for me. But I so appreciate it. Your explaination is good and clear. Merci énormément.
Thanks for the support, I am glad the videos are helping you.
You are an expert sir and am a fan of all your videos! Great stuff 👍
Thank you very much.
Hy their iam using Linux Mint from an USB Stick couse my Laptop is infected with something since a long time. And i get the Error INVALID SCRIPTWHITELIST configuration option: Non-existent pathname: /usr/bin/egrep & fgrep !!!
How can i Fix this ?
Hi man, thank you so much for explaining a little how my tool works. I really appreciate it!
Hi hackersploit:when you download root kit, wouldn't that leave you to an open backdoor to own computer and how do you contain it n how fix all the warning sign.
Sir, could you also post a video about how rootkits function and how can they be used
Use Parrot Linux. It has way better security than Kali
Hey bud. Thanks for so much for all the amazing videos you post. Learnt so much and pass on my knowledge learnt from you to friend who are in the same field. Your are in my top 3 UA-camrs and trust me I have a lot lol. Keep up the good work and keep them coming. Take care and stay safe. If only this would take away Covid-19
Thank you very much for your support.
There should be more videos on defending against these attacks. Hopefully in the future you make more demonstration videos in taking actions on an exploited OS
My friend you should have shown how to install a rootkit on a victim's machine / computer...now that would be very useful indeed !😎☺
That is coming next
OK thanks
please create a video how to successfully attack wordpress if they are vulnerable .since most website use wordpress as a content management.hope u ll create.....
Excellent vids. Useful informing. Love it Bro
Awesome video nice great information sir can upload a video of OSINT tools we are regularly watch your channel for these types vif video's thank u
This video is awesome and thanks a lot. Please make more videos on forensic...thanks again
Hello my friend, what you should have shown in thus video is how to detect root kits on remote or external systems , that would have been more useful instead !😎
I was very happy to c ur video on root kit detection.
I 2as wondering if u can make a few videos maybe even a series of videos on malware analysis.
For instance I get a pdf in my email and I wanna check it to see if it is safe,by opening the file and looking at its contents. (In kali)
The goal would be to get a better understanding of malware and how to detect it.
That is a great suggestion.
HackerSploit
😊
Looking forward
Thank u
Okay. Some good stuff you have here.
When u speak about backdoors and rootkits, a few details I need cleared. Would I be right in saying that rootkit is on the root level whereas backdoor are in code level like say PHP?
Thanks again for your efforts man, I want to suggest if you can make videos about Forensics using Kali Linux.
Cheers!
Is this useful for detecting rootkits hidden in the BIOS?
What’s ur everyday OS and VM?
So I'm a new Linux user running Mint 19.1 Mate and I just downloaded this program and ran it once. It said I had 11 possible rootkits. Can you explain the course of action to take when that happens? Like, how do I get rid of them if I need to, it seems RKhunter is more for just telling me they're there rather than doing anything about them which is fine, I just need to know what I need to do. Do I have to manually go to each folder, inspect the file and delete it by hand or what?
Thank you for the video, it would be awesome if you make more videos related to forensics.
Great suggestion I’ll work on some more
Excellent video !
So- does chrootkit / rkhunter automatically remove the problems?
I gave you the 100th Like ! Nice Video!
Dude you are very funny at times when you say for eg:- 6:23-6:29 :D
:)
Can you check every directory and file?
When are you going to do the Metasploitable 3 video? I know a lot of people are waiting for that one.
Bro Show Us How To Install A rootkit On A Victim That Would Be Very Useful .......
Awesome channel mate!! Learned more here then at school! Anything similar (chkrootkit & rkhunter) for Parrot OS?
The irony is that a rootkit could manipulate the chkrootkit program in a way that it hides the rootkit. You would have to use a live Linux system and chroot into the target system.
Nice Topic, nice Video!
Thanks, glad you enjoyed it.
Sir please make a video on SQL INJECTION
Can make another video show how to detect root kit on windows platforms 🙏
how to check for remote system whether they have rootkits???
mine says possible 4 rootkit but i just did a fresh install how can this be
I got rootkit warning after getting latest kali from website. How to remove it
please zoom in by presing CTRL+SHIFT & +
Can you please do a video showing how you find and attack a specific machine/android on your network
Alright.
HackerSploit ..thank you so much. I think beginners like me need something like that to understand more of the basics. Thank you
shows 3 possible rootkit
whether i should worried or not.....
ensina agente instalar e usar Parat Rat?
Can anyone help me with the apache2 error. When i try to start apache2 ,it gives me error:
Job for apache2.service failed because the control process exited with error code.
Now tell me what to do? Every time I have to reinstall apache2 to overcome this problem. Please give me a sustainable solution.
good bro
Bro give knowledge about programming languages.
Just install any antivirus .. i suggest quick heal total security trial version if you can't buy it
Thank you.
You are welcome.
How to make a root kit for educational purposes
How to delete the detected rootkits?
keep it up
ERROR: Invaild SCRIPTWHITELIST: Non existing pathname:/usr/bin/egrep and fgrep
Guys believe it or i had a root kit it sait possible succepts:1 now what to do HOW DO I REMOVE IT HACKERSPLOIT
Run rkhunter
رابط تحميل البرنامج ممكن و يندوز 7
ما يتكلم عربي
How to solve "network autoconfiguration failed" error plz ?
Because it's not connecting to. WiFi in dual boot
What wifi adapter do you have installed?
It showed no adapter found, so I tried by installing compat wireless 2.6,wifi started but is unable to detect any networks
HackerSploit please do solve the issue..
hi hacker sploit, i have this one /usr/bin/vendor_perl/GET /usr/bin/ldd usr/bin/fgrep /usr/bin/egrep Checking for prerequisites Checking for suspicious (large) shared memory segment Checking for hidden files and directorie warnings
احسنت استمر
The problem about chkrootkit and rkhunter is that they are restricted to a few previously known rootkits. That will never work against NSA surveillance! - look out for a better tool: www.elstel.org/debcheckroot/
Please do solve my issue...
Mine gave me 5 possible rootkits as answer
where can I get ROOTKIT?
HaCkEr'S NeTwOrK 3:50
Hey man where we can chat? I need your help..
Ale I can help you ! What's the problem !
I probably can't help you but can I hear it anyways?
I’m taking a+ 902 right now, and the information in the course is laughable. I haven’t had to study once. Never has the course mentioned anything more complex than a VM.
Yes that’s true most skip over hardware
Utorrent for video pls :)
video için utorrent :D?
@@asphyrx kanka ne için yazdığımı hatırlamıyorum valla 3 yıl olmuş 😂
Aşırı saçma yazmışım ne demek istedim Allah bilir 😂
$ rkhunter -c
$ Invalid syslog facility/priority value: authpriv.warning
PLS HELP
3rd this time :-(
I have a compromised server with ".resyslogd"
According to this post askubuntu.com/a/718836 rkhunter cannot be installed in a compromised system, but based on your video seems that it is able to detect the threat. Any suggestions?
Thanks!