Your strategy to check if you have Viruses

Hi guys I am curious of your strategy about secure your parrot. What tools you use what method to check if you have Viruses/Rootkits/rats and other shitty stuff. How do I check if my system is clean? and How I secure more. Any information about security are welcome.


think … this is a very complex thema.
there is an old post here in the forum with the same problematic.
maybe i (or you) will find it tomorrow. :slight_smile:

I check open ports and see what’s it’s going on on my Pc. I am curious of strategy of other people. Sent then mate link if you’ll find it?

FIRST!!! … YESSSSSS :wink:


First of all i would start with:

  • fix my connection to the i-net (a good and secure router/firewall which i own)

  • then only install verified ISOs

  • dont add strange repositories or just clone staff from github or something else you dont understand/have checked line by line)

  • classical tools like rkhunter , lynis and something else will have much false positive on parrot i think … :slight_smile:

  • dont trust other usb devices

  • browser and mail program sandboxed
    … etc … etc

to be continued … if you like?


Sure mate, that’s good I take already one of your idea to my security collection. Sure continue, security/privacy it’s most important now so I like to hear that and other people also can share good ideas.

1 Like

Sounds like what you want to be assured that your system have not been modified, Your computer to be specific and not the entire company network as mentioned in the link shared by @rowie. It mentions usage of tools that need some practice to get used to and I don’t think home users needs to go that fare to be assured for their system integrity. Of course I would encourage someone learning new things but if someone is in emergency, Then here’s what I would suggest

So let me shorten your workload effectively. There is this awesome tool called unix-privesc-check preinstalled in parrotsec. It tells you if you need to pay attention to something (aka if any crucial files have been modified, checksums are modified and giving out any sort of error, have you left any root file misconfigured or vulnerable and so on)

The useage is as simple as this, open a terminal, type sudo unix-privesc-check standard and boom! You’re results start generating.

More details :

Usage: unix-privesc-check { standard | detailed }

"standard" mode: Speed-optimised check of lots of security settings.

"detailed" mode: Same as standard mode, but also checks perms of open file
                 handles and called files (e.g. parsed from shell scripts,
                 linked .so files).  This mode is slow and prone to false 
                 positives but might help you find more subtle flaws in 3rd
                 party programs.

This script checks file permissions and other settings that could allow
local users to escalate privileges.

Use of this script is only permitted on systems which you have been granted
legal permission to perform a security assessment of.  Apart from this 
condition the GPL v2 applies.

Search the output for the word 'WARNING'.  If you don't see it then this
script didn't find any problems.

Coming to your concerns regarding rootkits, you;re just in luck :stuck_out_tongue_winking_eye: There is this tool called rkhunter which, again comes preinstalled in parrotsec. Here’s how to use it to hunt down known rootkits from their database : How to use rkhunter

If you wanna skip that link i shared above, here’s the basic syntax for using rkhunter

sudo rkhunter --update
sudo rkhunter --propupd to update the rootkit database, the more recent database, the better for your system (aka better detection)
And finally to start system scan,
sudo rkhunter --check

Remember to run these as superuser because scanning and making sure core directories and files are manipulated by any sort of malware/rootkit.

Network scan, Port scan, running-service scan also plays a part in home network/device security assessment. :wink:

Also, Have a look at what @RedRuby have to say -> in this massive, but hella useful golden tips by her to stay secure with minimum efforts.Worth reading


Really appreciate your help :slight_smile: I just scanned with rkhunter and I don’t know how to analyse that or if that false warnings…

File properties checks…
Files checked: 151
Suspect files: 1

Rootkit checks…
Rootkits checked : 501
Possible rootkits: 8

Applications checks…
All checks skipped

1 Like

Drop the complete outcome on and share a link

Make sure to remove/hide any personally identifiable data or anything you may consider as private (some corporate file names, etc.)


I don’t really agree with chrootkit / rkhunter or unix-priv-check result. The authors of the tools have their ideas but the ideas are not 100% accurate in all cases.
Malware is a very huge section and identify malware is huge as well. This is very interesting because Linux could be harder to find malware if users made mistakes.
This is a very interesting topic and because i am doing something like this (check malwares, protect end users) so I’ll keep tracking this.


Agreed. But when it comes to Linux malware, there are only a handful, most of which are known. I would have recommended using thirdparty antimalware like F-PROT or Sophos or Comodo for linux devices. All of them are free but since parrotsec has already quite a few exploits preinstalled, Installing an antimalware would seem a bad idea, may break the system in some cases. What I said above was meant just for basic home users for their monthly device security assessment.

These are just basic options for analyzing configurations and scanning for known rootkits. Of course new malware evolve everyday, but as far as I’m aware of, Linux does have malware, few but nonetheless they exists, and most of them are known :slight_smile:

Unless a user is specifically targeted, I don’t think he should be worried about a linux malware that is not known to the AV database. rkhunter does have pretty good database for known Linux malware too.


When it comes to linux malware, yes. Most of them are known to the database :smiley:

1 Like

I agree with this point. APT attacks use new method so it is hard to identify the malware.

The point of basic is it is fast and… basic. So it is harder to trust. I don’t say it is useless or something but if you want to check the real rootkits / malwares you’ll need more complex methods to identify or you’ll see malware everywhere.

It depends on the engines and users. For example, if you generate meterpreter for Linux from msfvenom, clamAV can’t detect it but Clam can detect malware for Windows. That is pretty funny. The problem of Linux is it has pre-installed interpreters (or at least Parrot and some distro) so malicious codes with obfuscation methods will totally bypass signature based detection.

AV will be useful for home edition only i think

1 Like

Trust me T-T I’ve had a bad experience about this in the past. Not to install any antimalware on a pentesting system.

1 Like

Exactly. I guess @Meet didnt mention clamav because ClamAV isn’t sufficient or anywhere as close as sufficient for protecting a device. If I had to put a bet between f-prot, comodo and sophos, My money is on Sophos for best detection, prevention and removal of all the three above mentioned. Wouldn’t you agree @dmknght & @Meet :smile:


Actually i don’t believe AV solutions focus on Linux system as home solutions. They’ll focus on Enterprise environments with there best techniques. For me there is +1 point for ClamAV because it supports Yara rule and it means everybody can create their own signatures and use signatures from internet.
I don’t remember which one use rootkit signatures (chrootkit or rkhunter) but that is a good point instead of just check file and tell users “there is something wrong with this file”. Like i said before, this technique gives so many false positive results.


Actually i don’t believe AV solutions focus on Linux system as home solutions. True be told there really aren’t any particularly

Bingo! Fact of the matter is linux desktops are at best what…??..5% of the market maybe for home computers, you don’t need to worry much about viruses unless you’re running a server that’s publicly accessible. The part of the system that is universally a point of entry for malicious software is the web browser, that goes for any OS.

And that is critical point. If you are under an APT campaign, you are totally unprotected (yeah malware can bypass protection layers but there is a chance to detect it). For example, If someone send me a doc with libre office 0day and tell me that is his / her CV, i can’t think it is a malicious file 100%.
I believe we have to think about that. It is going to be 2020 soon and protection for Linux end users is still like 1980. Our users may not be under attack but there are naughty NSA agents out there and we have to think about protect every single user from them.


Have anybody tried write yara rule for detect malware?

Hi sorry for late reply. Here is results of rkhunter. I deleted all not found malwares, leave just suspicious.

Would be great if someone can look for it.

Thank you.

1 Like