Project

General

Profile

Actions

Support #2182

closed

Rootkit assessment with Suricata

Added by Jessy L almost 7 years ago. Updated about 5 years ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Affected Versions:
Label:

Description

I wanted to do a rootkit assessment with Suricata on Windows.

The command used:
suricata -c suricata.yaml -i WIFI IP4 ADDRESS

The next day, I inspected the eve.json file contents and found no suspicious DNS or IP addresses.

Is that enough to know there is no hardware or OS rootkit or malware?

Do you recommend any other commands?

Thanks

Actions

Also available in: Atom PDF