memory_detect_rootkit
Detect rootkits in Linux memory dumps by analyzing syscall table tampering and hidden kernel modules to identify system compromise indicators.
Instructions
Check for rootkits via syscall table tampering and hidden kernel modules. Runs linux_check_syscall and linux_hidden_modules plugins. Returns syscall_check, hidden_modules, rootkit_indicators, and likely_compromised. Read-only analysis.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| dump_path | Yes | Path to the Linux memory dump file | |
| profile | Yes | Volatility 2 profile name |