How is it possible to list processes and uids associated with them in a more reliable manner?

On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?

On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?

A.
Use “Is”

B.
Use “lsof”

C.
Use “echo”

D.
Use “netstat”

Explanation:
lsof is a command used in many Unix-like systems that is used to report a list of all
open files and the processes that opened them. It works in and supports several UNIX flavors.



Leave a Reply 1

Your email address will not be published. Required fields are marked *