How to check If my PC was exploited after apt exploit? [closed]












2















I used



sudo apt-get update
sudo apt-get upgrade


before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?










share|improve this question













closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43


Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.



















  • Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

    – DopeGhoti
    Jan 24 at 20:23











  • @DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

    – nox
    Jan 24 at 20:31











  • try running chkrootkit

    – FabioM
    Jan 24 at 21:27











  • Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

    – Kushagra Karira
    Jan 25 at 12:21
















2















I used



sudo apt-get update
sudo apt-get upgrade


before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?










share|improve this question













closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43


Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.



















  • Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

    – DopeGhoti
    Jan 24 at 20:23











  • @DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

    – nox
    Jan 24 at 20:31











  • try running chkrootkit

    – FabioM
    Jan 24 at 21:27











  • Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

    – Kushagra Karira
    Jan 25 at 12:21














2












2








2


1






I used



sudo apt-get update
sudo apt-get upgrade


before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?










share|improve this question














I used



sudo apt-get update
sudo apt-get upgrade


before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?







debian linux-mint apt security aptitude






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 24 at 19:51









noxnox

141




141




closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43


Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.









closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43


Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.















  • Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

    – DopeGhoti
    Jan 24 at 20:23











  • @DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

    – nox
    Jan 24 at 20:31











  • try running chkrootkit

    – FabioM
    Jan 24 at 21:27











  • Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

    – Kushagra Karira
    Jan 25 at 12:21



















  • Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

    – DopeGhoti
    Jan 24 at 20:23











  • @DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

    – nox
    Jan 24 at 20:31











  • try running chkrootkit

    – FabioM
    Jan 24 at 21:27











  • Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

    – Kushagra Karira
    Jan 25 at 12:21

















Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

– DopeGhoti
Jan 24 at 20:23





Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.

– DopeGhoti
Jan 24 at 20:23













@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

– nox
Jan 24 at 20:31





@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?

– nox
Jan 24 at 20:31













try running chkrootkit

– FabioM
Jan 24 at 21:27





try running chkrootkit

– FabioM
Jan 24 at 21:27













Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

– Kushagra Karira
Jan 25 at 12:21





Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.

– Kushagra Karira
Jan 25 at 12:21










0






active

oldest

votes

















0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes

Popular posts from this blog

How to reconfigure Docker Trusted Registry 2.x.x to use CEPH FS mount instead of NFS and other traditional...

is 'sed' thread safe

How to make a Squid Proxy server?