资源说明:Detect hooked system calls (rootkit) in FreeBSD
This module checks all system calls in the running kernel to detect if they have been hooked into. Thus revealing a possible rootkit. # Usage env PATH=/bin:/sbin:/usr/sbin:/usr/bin /bin/sh -c "make clean && make && make load && make unload && make clean" # Example output- Modified System Calls - number name new-addr ------ --------- -------- 98 connect 0xc92d95f3 104 bind 0xc92d9682 - End -
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。
English
