Source: unhide
Section: admin
Priority: extra
Maintainer: Debian Forensics <forensics-devel@lists.alioth.debian.org>
Uploaders: Christophe Monniez <christophe.monniez@fccu.be>, Julien Valroff <julien@debian.org>
Build-Depends: debhelper (>= 8.0.0)
Standards-Version: 3.9.2
Homepage: http://www.unhide-forensics.info
Vcs-Browser: http://git.debian.org/?p=forensics/unhide.git;a=summary
Vcs-Git: git://git.debian.org/forensics/unhide.git

Package: unhide
Architecture: any
Depends: ${misc:Depends}
Suggests: rkhunter
Description: Forensic tool to find hidden processes and ports
 Unhide is a forensic tool to find processes and TCP/UDP ports hidden by
 rootkits, Linux kernel modules or by other techniques. It includes two
 utilities: unhide and unhide-tcp.
 .
 unhide detects hidden processes using three techniques:
  * comparing the output of /proc and /bin/ps
  * comparing the information gathered from /bin/ps with the one gathered from
    system calls (syscall scanning)
  * full scan of the process ID space (PIDs bruteforcing)
 .
 unhide-tcp identifies TCP/UDP ports that are listening but are not listed in
 /bin/netstat through brute forcing of all TCP/UDP ports available.
 .
 This package can be used by rkhunter in its daily scans.
