There is one package out there (Linux/Rst-B) that seems to be the most common (relatively speaking) issue out there for *nix, and there is a handy tool for detecting it. It comes with a pre-compiled binary for Debian (which works in Ubuntu as well).
We're going to put it in /usr/local/sbin, so that it is on the path for later on:
sudo su -I realize that you can just sudo the wget and extraction commands if you don't have write privs on sbin/, but hey, I'm lazy.
cd /usr/local/sbin/
wget http://www.sophos.com/support/cleaners/detection_tool.tar.gz
tar xvfz detection_tool.tar.gz
This will extract the detection_tool/ directory, which gives you the source and the pre-compiled binaries. To compile from source:
cd /usr/local/sbin/detection_toolCopy the binary to the sbin/ directory with link:
make
ln -s /usr/local/sbin/detection_tool/pre-compiled/detection_tool /usr/local/sbin/rst_detection_tool
OR, if compiled from source:
ln -s /usr/local/sbin/detection_tool/detection_tool /usr/local/sbin/rst_detection_tool
To use:
rst_detection_tool [-v] (path)
So to scan the entire filesystem:
rst_detection_tool /
If all is well, you'll get this output:
root@ubuShock:/usr/local/sbin# rst_detection_tool /
Sophos Rst-B Detection Tool
---------------------------
Copyright (c) 2008 Sophos Plc. All rights reserved.
Scanned 681699 files, found 0 infections of Linux/Rst-B.
End of scan.
root@ubuShock:/usr/local/sbin#
Anyway, best of luck.
NOTE: This howto taken from Howtoforge - Which is a great place for howtos relating to linux. I've altered it a bit to make it a bit easier to read IMHO.
No comments :
Post a Comment