On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?
A.
Use "Is"
B.
Use "lsof"
C.
Use "echo"
D.
Use "netstat"
Explanation:
lsof is a command used in many Unix-like systems that is used to report a list of all open files and the processes that opened them. It works in and supports several UNIX flavors.