Simulate rkhunter rootkit detection scan logs for security training. Generate realistic system check outputs, malware scans, and vulnerability assessments.
Press Ctrl + C to exit. Output is simulated for demo purposes only.
This module simulates system checks, rootkit tests, and signature scans log events with realistic pacing.
It is designed for demos, log pipeline testing, and documentation where the real stack is unavailable.
All output is generated locally in the browser and is safe to run.
Running Rootkit Hunter version 1.4.6 on localhost Info: Start date is Fri Jan 30 2026 10:21:33 UTC Starting system checks... Checking for SucKIT rootkit... /usr/bin/ls [ Not found ] /usr/bin/ps [ Not found ]
No. It is a simulator that prints log text only.
Yes. The CLI supports speed and repeat options, and the web page can be refreshed.
No. It does not install, update, or modify anything.
rkhunter (Rootkit Hunter) scans the system and reports checks for rootkits and suspicious files. Its log format is used in security auditing.
The output above is simulated for demos and log testing; it does not perform real system checks.
Popular questions and answers from Stack Overflow related to rkhunter.
Run: sudo rkhunter --update to update malware signatures. Then sudo rkhunter --propupd to update file properties database after system updates. Run checks with sudo rkhunter --check.
Edit /etc/rkhunter.conf to whitelist known-good files using ALLOWHIDDENDIR, ALLOWHIDDENFILE, or SCRIPTWHITELIST. After changes, run rkhunter --propupd to update baseline.
Set up cron job: 0 3 * * * /usr/bin/rkhunter --check --cronjob --report-warnings-only. Or use systemd timer. Configure MAIL-ON-WARNING in rkhunter.conf for email alerts.
File hash/permissions changed since last propupd. Normal after system updates. Run rkhunter --propupd after legitimate updates. If unexpected, investigate the file for tampering.
Use --enable or --disable flags: rkhunter --check --enable rootkits. Available tests: rootkits, trojans, os_specific, additional, properties. List tests with --list tests.
Both scan for rootkits. rkhunter also checks file properties, ports, startup files. chkrootkit is simpler, focuses on rootkit signatures. Best practice: run both for comprehensive coverage.
Log at /var/log/rkhunter.log. Look for [Warning] and [Bad] entries. [OK] is fine. Check "System checks summary" at end. Warnings need investigation, not all are malware.
In /etc/rkhunter.conf, set WEB_CMD to wget/curl path or disable: WEB_CMD="". Some systems need explicit path like WEB_CMD="/usr/bin/wget". Restart rkhunter after change.
rkhunter detects 100+ rootkits including: SucKIT, Adore, Knark, Mood-NT, 55808 trojan, and many more. Also detects suspicious strings in binaries, hidden processes, backdoors.
In /etc/rkhunter.conf, add: ALLOWHIDDENDIR=/path/.hidden_dir. For files: ALLOWHIDDENFILE=/path/.hidden_file. Common whitelists: .git directories, dotfiles in home.
Popular video tutorials to learn more about rkhunter.
Learn Linux TV
Learn Linux server security including updates, firewall, SSH hardening, and security tools. Essential for understanding rootkit detection context.
Watch on YouTubeNetworkChuck
Comprehensive guide to securing Linux servers including intrusion detection, monitoring, and security best practices.
Watch on YouTube