How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

1. Check the system password file

Start with the obvious: view /etc/passwd and note its modification date using ls -l /etc/passwd. Identify privileged accounts (UID 0) and look for any accounts with empty passwords.

2. Examine running processes for anomalies

Search for suspicious processes, e.g., ps -aef | grep inetd. A legitimate inetd PID appears early; an entry like inetd -s /tmp/.xxx indicates a possible backdoor. Kill suspicious processes with kill -9 <pid> and verify they do not respawn. Use find / -name <program_name> -print to locate the originating files.

3. Inspect daemon configuration files

Review /etc/inetd.conf (or the equivalent on Solaris) with cat /etc/inetd.conf | grep -v "^#" to see which remote services are enabled. Attackers may replace binaries such as in.telnetd to create a password‑less root shell.

4. Check network connections and listening ports

Run netstat -an to list all connections and listening ports and spot illegal ones.

Run netstat -rn to verify routing and gateway settings.

Run ifconfig -a to examine network‑interface configurations.

5. Review system logs

Use last | more to see login history. Verify that the syslog daemon is running and its start time is normal, because attackers often stop syslog to hide activity. Examine log directories ( /var/log on Linux, /var/adm on Solaris) and check the integrity and timestamps of wtmp, utmp, and related files.

6. Search for core dump files

Attackers may generate core files after exploiting services. Locate them with find / -name core -exec ls -l {} \; and investigate the directories for signs of compromise.

7. Look for .rhosts and .forward backdoor files

Globally search for these files:

find / -name ".rhosts" -print
find / -name ".forward" -print

If a .rhosts file contains only "+" entries, anyone can log in via the rlogin (port 513) service without authentication. Malicious .forward entries can execute arbitrary commands when mail is processed.

8. Verify system file integrity

Compare file hashes or package signatures. On Linux, use rpm -V $(rpm -qf <file>) or md5sum <file> (options -b, -c, -t) to detect tampering. Pay special attention to critical binaries such as /bin/login, daemon binaries referenced in inetd.conf, and /etc/crontab. Also search for setuid files ( find -perm 4000 -print) that could grant a root shell.

9. Inspect kernel modules for hidden backdoors

List loaded modules with lsmod (Linux) or modinfo (Solaris). Attackers may hide modules (e.g., knark) or remove them from /proc/modules. Examine the /proc directory for suspicious entries and use tools to detect hidden modules.

10. Limitations of manual intrusion detection

Manual methods are host‑centric, cannot see network‑level attacks, require up‑to‑date vulnerability knowledge, react only after an incident, and often miss coordinated exploits or zero‑day attacks.

11. Comparing intrusion detection systems (IDS)

Effective security combines a robust IDS with skilled administration. Some commercial tools (e.g., realsecure) have false‑positive/negative issues, may be targeted by attackers, and can become a single point of failure if the IDS itself is compromised.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

log analysisNetwork Monitoringsystem securityintrusion detectionkernel integrity
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.