Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Which system executables (if any) were trojaned and what configuration files did they use?

0
10 Posted

Which system executables (if any) were trojaned and what configuration files did they use?

0
10

First I get the md5sums of all of the files on the system so that I can compare them to the ones provided with the system image. I’ll need to mount a copy of the partition, but the system won’t mount it until it has been fsck’d so I’ll fsck a copy of the copy.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123