D7net
Home
Console
Upload
information
Create File
Create Folder
About
Tools
:
/
proc
/
self
/
root
/
usr
/
local
/
maldetect.last
/
internals
/
Filename :
scan.etpl
back
Copy
if [ -z "$type" ]; then type=scan fi cat > $tmpf <<EOF HOST: $HOSTNAME SCAN ID: $scanid STARTED: $scan_start_hr EOF if [ ! "$type" == "digest" ]; then cat >> $tmpf <<EOF COMPLETED: $scan_end_hr ELAPSED: ${scan_et}s [find: ${file_list_et}s] EOF else cat >> $tmpf <<EOF MODE: inotify digest ELAPSED: $inotify_run_time EOF fi if [ "$spath" ]; then echo "PATH: $hrspath" >> $tmpf fi if [ "$days" ] && [ ! "$days" == "all" ]; then echo "RANGE: $days days" >> $tmpf fi cat >> $tmpf <<EOF TOTAL FILES: $tot_files TOTAL HITS: $tot_hits TOTAL CLEANED: $tot_cl EOF if [ "$quarantine_hits" == "0" ] && [ ! "$tot_hits" == "0" ]; then echo "WARNING: Automatic quarantine is currently disabled, detected threats are still accessible to users!" >> $tmpf echo "To enable, set quarantine_hits=1 and/or to quarantine hits from this scan run:" >> $tmpf echo -e "/usr/local/sbin/maldet -q $datestamp.$$\n" >> $tmpf fi if [ "$quarantine_clean" == "1" ]; then if [ "$type" == "scan" ] && [ -f "$sessdir/clean.$$" ] && [ ! -z "$(cat $sessdir/clean.$$)" ]; then cleaned_list="$sessdir/clean.$$" elif [ "$type" == "digest" ] && [ -f "$tmpdir/.digest.clean.hits" ] && [ ! "$tot_cl" == "0" ]; then cleaned_list="$tmpdir/.digest.clean.hits" fi if [ -f "$cleaned_list" ]; then cat >> $tmpf <<EOF CLEANED & RESTORED FILES: $(cat $cleaned_list) EOF fi if [ "$quarantine_suspend_user" == "1" ]; then if [ -f "$sessdir/suspend.users.$$" ] && [ ! -z "$(cat $sessdir/suspend.users.$$)" ]; then suspended_list="$sessdir/suspend.users.$$" elif [ "$type" == "digest" ] && [ -f "$tmpdir/.digest.susp.hits" ] && [ ! "$tot_susp" == "0" ]; then suspended_list="$tmpdir/.digest.susp.hits" fi if [ -f "$suspended_list" ]; then cat >> $tmpf <<EOF SUSPENDED ACCOUNTS: $(cat "$suspended_list") EOF fi fi fi if [ ! "$tot_hits" == "0" ]; then if [ "$type" == "digest" ]; then hitlist_file="$tmpdir/.digest.alert.hits" else hitlist_file="$scan_session" fi if [ -f "$hitlist_file" ]; then echo "FILE HIT LIST:" >> $tmpf if [ "$coltest" ]; then cat $hitlist_file | column -s ':' -t -o ':' >> $tmpf else cat $hitlist_file >> $tmpf fi fi fi cat >> $tmpf <<EOF =============================================== Linux Malware Detect v$ver < proj@rfxn.com > EOF
Name
Size
Last Modified
Owner
Permissions
Actions
VERSION.hash
0.063
KB
February 22 2025 10:04:29
root
0644
compat.conf
3.831
KB
September 07 2018 1:37:50
root
0644
functions
85.057
KB
April 08 2023 10:05:08
root
0644
hexfifo.pl
1.381
KB
March 27 2023 7:28:51
root
0644
hexstring.pl
0.629
KB
March 27 2023 7:28:41
root
0644
importconf
14.811
KB
March 27 2023 7:44:18
root
0644
internals.conf
4.29
KB
March 28 2023 2:41:42
root
0644
panel_alert.etpl
2.121
KB
March 27 2023 7:17:37
root
0644
scan.etpl
2.291
KB
September 26 2018 4:51:39
root
0644
tlog
2.438
KB
September 27 2015 7:38:49
root
0750
2017 © D7net | D704T team