How to check If my PC was exploited after apt exploit? [closed]
I used
sudo apt-get update
sudo apt-get upgrade
before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?
debian linux-mint apt security aptitude
closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43
Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
I used
sudo apt-get update
sudo apt-get upgrade
before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?
debian linux-mint apt security aptitude
closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43
Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
try running chkrootkit
– FabioM
Jan 24 at 21:27
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21
add a comment |
I used
sudo apt-get update
sudo apt-get upgrade
before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?
debian linux-mint apt security aptitude
I used
sudo apt-get update
sudo apt-get upgrade
before I read https://www.debian.org/security/2019/dsa-4371
Is there a way to check if my PC got exploited/hacked/virused ?
debian linux-mint apt security aptitude
debian linux-mint apt security aptitude
asked Jan 24 at 19:51
noxnox
141
141
closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43
Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.
closed as too broad by Rui F Ribeiro, Michael Homer, Kusalananda, Mr Shunz, Thomas Jan 25 at 10:43
Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
try running chkrootkit
– FabioM
Jan 24 at 21:27
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21
add a comment |
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
try running chkrootkit
– FabioM
Jan 24 at 21:27
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
try running chkrootkit
– FabioM
Jan 24 at 21:27
try running chkrootkit
– FabioM
Jan 24 at 21:27
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21
add a comment |
0
active
oldest
votes
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Make a note of all packages installed, and compare the checksum of the locally-installed package file to the checksum of a copy of the package in a known-good repository.
– DopeGhoti
Jan 24 at 20:23
@DopeGhoti Is there a guide, article or documentation where I can read how to do this ?
– nox
Jan 24 at 20:31
try running chkrootkit
– FabioM
Jan 24 at 21:27
Suggestion : install apparmor from debian stretch backports. That'll save you from being possible victim of future security flaw.
– Kushagra Karira
Jan 25 at 12:21