Back to home Module: rkhunter

rkhunter Rootkit Scanner Log Generator - Security Audit Simulator | Fakeact

Simulate rkhunter rootkit detection scan logs for security training. Generate realistic system check outputs, malware scans, and vulnerability assessments.

Terminal preview

Press Ctrl + C to exit. Output is simulated for demo purposes only.

Overview

This module simulates system checks, rootkit tests, and signature scans log events with realistic pacing.

It is designed for demos, log pipeline testing, and documentation where the real stack is unavailable.

All output is generated locally in the browser and is safe to run.

Use cases

  • Demo rkhunter workflows without running the real stack.
  • Test log ingestion rules around system checks and signature scans events.
  • Create screenshots, recordings, or training material on demand.

Notes

  • All output is simulated text; no system changes are made.
  • Refresh the page to restart the log stream.
  • Use the CLI for longer sessions or offline demos.

Sample output

Running Rootkit Hunter version 1.4.6 on localhost
Info: Start date is Fri Jan 30 2026 10:21:33 UTC
Starting system checks...
  Checking for SucKIT rootkit...
  /usr/bin/ls                                 [ Not found ]
  /usr/bin/ps                                 [ Not found ]

FAQ

Is rkhunter output real?

No. It is a simulator that prints log text only.

Can I control the speed of rkhunter?

Yes. The CLI supports speed and repeat options, and the web page can be refreshed.

Does rkhunter change my system?

No. It does not install, update, or modify anything.

What's more about rkhunter?

rkhunter (Rootkit Hunter) scans the system and reports checks for rootkits and suspicious files. Its log format is used in security auditing.

The output above is simulated for demos and log testing; it does not perform real system checks.

Learn more at rkhunter

Stack Overflow Questions

Popular questions and answers from Stack Overflow related to rkhunter.

How to update rkhunter database?
Accepted Answer

Run: sudo rkhunter --update to update malware signatures. Then sudo rkhunter --propupd to update file properties database after system updates. Run checks with sudo rkhunter --check.

How to fix false positives in rkhunter?
Accepted Answer

Edit /etc/rkhunter.conf to whitelist known-good files using ALLOWHIDDENDIR, ALLOWHIDDENFILE, or SCRIPTWHITELIST. After changes, run rkhunter --propupd to update baseline.

How to run rkhunter automatically?
Accepted Answer

Set up cron job: 0 3 * * * /usr/bin/rkhunter --check --cronjob --report-warnings-only. Or use systemd timer. Configure MAIL-ON-WARNING in rkhunter.conf for email alerts.

What does "Warning: The file properties have changed" mean?
Accepted Answer

File hash/permissions changed since last propupd. Normal after system updates. Run rkhunter --propupd after legitimate updates. If unexpected, investigate the file for tampering.

How to check specific test in rkhunter?
Accepted Answer

Use --enable or --disable flags: rkhunter --check --enable rootkits. Available tests: rootkits, trojans, os_specific, additional, properties. List tests with --list tests.

What is the difference between rkhunter and chkrootkit?
Accepted Answer

Both scan for rootkits. rkhunter also checks file properties, ports, startup files. chkrootkit is simpler, focuses on rootkit signatures. Best practice: run both for comprehensive coverage.

How to interpret rkhunter log file?
Accepted Answer

Log at /var/log/rkhunter.log. Look for [Warning] and [Bad] entries. [OK] is fine. Check "System checks summary" at end. Warnings need investigation, not all are malware.

How to fix "Invalid WEB_CMD configuration option"?
Accepted Answer

In /etc/rkhunter.conf, set WEB_CMD to wget/curl path or disable: WEB_CMD="". Some systems need explicit path like WEB_CMD="/usr/bin/wget". Restart rkhunter after change.

What rootkits can rkhunter detect?
Accepted Answer

rkhunter detects 100+ rootkits including: SucKIT, Adore, Knark, Mood-NT, 55808 trojan, and many more. Also detects suspicious strings in binaries, hidden processes, backdoors.

How to whitelist hidden directories in rkhunter?
Accepted Answer

In /etc/rkhunter.conf, add: ALLOWHIDDENDIR=/path/.hidden_dir. For files: ALLOWHIDDENFILE=/path/.hidden_file. Common whitelists: .git directories, dotfiles in home.

YouTube Tutorials

Popular video tutorials to learn more about rkhunter.

10 Ways to Secure Your Linux Server

Learn Linux TV

Learn Linux server security including updates, firewall, SSH hardening, and security tools. Essential for understanding rootkit detection context.

Watch on YouTube
Linux Security - Protect Your Server

NetworkChuck

Comprehensive guide to securing Linux servers including intrusion detection, monitoring, and security best practices.

Watch on YouTube

Related modules

More Tools