On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?
A.
Use “Is”
B.
Use “lsof”
C.
Use “echo”
D.
Use “netstat”