On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?
A.
Use “Is”
B.
Use “lsof”
C.
Use “echo”
D.
Use “netstat”
Explanation:
lsof is a command used in many Unix-like systems that is used to report a list of all
open files and the processes that opened them. It works in and supports several UNIX flavors.
Hi there, I came upon aiotestking.com while searching for a similar topic in the search engines. It seems to be a good read; I’ve bookmarked it in my Yahoo favorites.
https://tonsilstonesauthority.wordpress.com/