Rkhunter is a very useful tool that is used to check for trojans, rootkits, and other security problems. This tutorial will touch on installing and setting up a daily report for rkhunter. Installing: wget http://downloads.rootkit.nl/rkhunter-1.2.7.tar.gz tar -zxvf rkhunter-1.2.7.tar.gz cd rkhunter-1.2.7 ./installer.sh Now you can run a test scan with the following command: /usr/local/bin/rkhunter -c How to setup a daily scan report? pico /etc/cron.daily/rkhunter.sh add the following replacing your email address: #!/bin/bash (/usr/local/bin/rkhunter -c --cronjob 2>&1 | mail -s "Daily Rkhunter Scan Report" ) chmod +x /etc/cron.daily/rkhunter.sh Updating rkhunter gets the latest database updates from their central server and matches your OS better to prevent false positives. rkhunter --update I just got a false positive!! What do i do? False positives are warnings which indicates there is a problem, but aren't really a problem. Example: some Linux distro updated a few common used binaries like `ls` and `ps`. You (as a good sysadmin) update the new packages and run (ofcourse) daily Rootkit Hunter. Rootkit Hunter isn't yet aware of these new files and while scanning it resports some "bad" files. In this case we have a false positive. You could always have your datacenter or a system administrator check out the server to verify that it is not compromised. More information on rkhunter can be found here: Rootkit.nl
rkhunter check for the md5 checksum of the binaries in the server and matches with the standard md5 checksum to see if it has been modified. Sometimes a disparity is shown. But then you can always update the wrong binaries using 'yum update software-name' also they may show couple of "hidden process running" which may be because of the mysql process running.