|
|
Don't trust this on hacked machines...
This is a great tool in general, but be very careful of trusting this on a hacked machine.
Don't trust this on hacked machines...
That's all well and good, but that's incomplete advice.
If the user wants to find out what processes are listening on TCP/IP ports, the lsof program will work, albeit with your caveat that the program may be hacked. Other things that could be done to simply check for listeners which are not as drastic as a complete system reinstall would be:
Oh... and backup, backup, backup! If you have a smart backup script with incrementals running daily, you might be able to see how and where your system may have been internally compromised (recent edits to files in /usr/bin are a good clue!)
Don't trust this on hacked machines...
That wouldn't work if the hacker has compromised libraries. You would need a statically linked binary. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.10 seconds |
|