A small linux information collection script is mainly used for emergency response. It can be used under Debian or Centos. Features CPU TOP10, memory TOP10 CPU usage boot time Hard disk space information User information, passwd information Environmental variable detection Service list System program changes (debsums -e and rpm -va) Network traffic statistics Network connection, listening port Open port Routing table information Route forwarding ARP DNS Server SSH login information SSH login IP iptables information SSH key detection SSH burst IP Crontab detection Crontab backdoor detection Find common configuration files Find common software Audit history files Querying HOSTS files lsmod exception kernel module Anomaly file detection (nc, tunnel, proxy common hacker tools) Large file detection (some large files packaged) Free space, hard disk mount Open port LD_PRELOAD detection LD_LIBRARY_PATH ld.so.preload NIC promiscuous mode Most used software Change the file mtime in the last 7 days Change the file ctime in the last 7 days View SUID file Find: hidden files Find sensitive files (nc, nmap, tunnel) alias LSOF -L1 SSHD Find bash bounce shell php webshell scan jsp webshell scan asp / aspx webshell scan Detection of mining process rkhunter scan Usage Networking status: apt-get install silversearcher-ag yum -y install the_silver_searcher Offline status: Debian：dpkg -i…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-12-04 06:39:002019-12-04 06:39:00LinuxCheck - Linux Information Collection Script
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org