Posted by: Pdfprep
Post Date: January 16, 2021
On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?
A . Use "Is"
B . Use "lsof"
C . Use "echo"
D . Use "netstat"
Answer: B
Explanation:
lsof is a command used in many Unix-like systems that is used to report a list of all open files and the processes that opened them. It works in and supports several UNIX flavors.
Leave a Reply