Anti-Virus and Rootkit Protection with ClamAV and rkhunter
Traducciones al EspañolEstamos traduciendo nuestros guías y tutoriales al Español. Es posible que usted esté viendo una traducción generada automáticamente. Estamos trabajando con traductores profesionales para verificar las traducciones de nuestro sitio web. Este proyecto es un trabajo en curso.
Anti-virus and Rootkit Detection
This guide teaches you how to use ClamAV, ClamTK, and rkhunter for anti-virus and rootkit detection to secure your server.
ClamAV is an open source anti-virus toolkit that is available for Linux, MacOS, and Windows.
You can install ClamAV with the aptitude package manager on Debian and Ubuntu or with the yum package manager on CentOS. The instructions in this guide show
apt examples and can be adapted for CentOS with
yum. ClamAV requires the
clamav utility and the
clamav-daemon for management.
Install the ClamAV utilities by running the following command:
sudo apt install clamav clamav-daemon
After the installation, you can check the version of ClamAV installed by running the following command:
Update the ClamAV Signature Database
Before you can get started with any scanning, you need to ensure that all the relevant ClamAV services and daemons are running. The first service you want to start is the
freshclam service which is responsible for updating the signature database.
In order to perform scans with ClamAV, you must have an active and updated signature database. It is recommended to keep your database up to date on a regular basis.
To update your signature database you need to stop the
freshclamservice. Do this by running the following command:
sudo systemctl stop clamav-freshclam
You can now update the signature database by running the freshclam command:
After the signature database has been updated you can now start the freshclam service by running the following command:
sudo systemctl start clamav-freshclam
Scanning with ClamAV
Scanning with ClamAV is simple and can be invoked by running the
clamscan command in the terminal. You can get started by scanning a particular directory.
For example, if you want to scan the
/etc/directory for infected files, run the following command:
sudo clamscan -i -r --remove /etc
-i: prints only infected files
--remove: removes infected files
--r: recursive scan, all the subdirectories in the directory are scanned
To learn more about the commands you can use with
clamscancheck the manual.
If you want to scan the entire system, run the following command:
sudo clamscan -i -r --remove /
After the scan is completed, a summary is displayed.
----------- SCAN SUMMARY ----------- Known viruses: 8930484 Engine version: 0.102.4 Scanned directories: 150 Scanned files: 439 Infected files: 0 Data scanned: 2.15 MB Data read: 0.93 MB (ratio 2.32:1) Time: 100.447 sec (1 m 40 s)
ClamTK is a GUI for ClamAV and is designed to streamline the scanning process for systems with a desktop manager or window manager. ClamTK does not work in a terminal as it is a GUI wrapper for ClamAV.
ClamTK can be installed by running the following command:
sudo apt-get install clamtk
Scanning With ClamTK
Scanning with ClamTK is simpler than with ClamAV.
Launch it by running the following command in the terminal:
The graphical interface appears. To start a scan, in the Analysis panel, click on the Scan a directory icon.
Select the directory you want to scan.
ClamTK scans the directory and displays a summary of the scan when it’s finished.
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, back doors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. Rkhunter is available as a package in most Linux distribution repositories.
Install rkhunter by running the following command:
sudo apt install rkhunter
Ensure that rkhunter database is updated by running the following command:
sudo rkhunter --propupd
Scanning with rkhunter
Running a scan with rkhunter is simple and can be started by running the following command:
sudo rkhunter --check
After the scan has been completed a scan summary is displayed along with the path to the log files that contain useful output.
System checks summary ===================== File properties checks... Files checked: 144 Suspect files: 4 Rootkit checks... Rootkits checked : 497 Possible rootkits: 0 Applications checks... All checks skipped The system checks took: 1 minute and 22 seconds All results have been written to the log file: /var/log/rkhunter.log One or more warnings have been found while checking the system. Please check the log file (/var/log/rkhunter.log)
This page was originally published on