{"id":26287,"date":"2025-03-07T12:07:46","date_gmt":"2025-03-07T10:07:46","guid":{"rendered":"https:\/\/cryptrz.org\/wordpress\/?p=26287"},"modified":"2025-05-14T05:40:57","modified_gmt":"2025-05-14T03:40:57","slug":"tour-dhorizon-de-clamav-et-rkhunter-sous-linux","status":"publish","type":"post","link":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/","title":{"rendered":"Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux"},"content":{"rendered":"\n<p>Il est courant d&rsquo;entendre que Linux est un <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Syst%C3%A8me_d%27exploitation\" target=\"_blank\" rel=\"noreferrer noopener\">syst\u00e8me d&rsquo;exploitation<\/a> inviolable, exempt de <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Virus_informatique\" target=\"_blank\" rel=\"noreferrer noopener\">virus<\/a> et de menaces informatiques. Cependant, cette perception est loin de la r\u00e9alit\u00e9. Bien que <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Liste_des_distributions_GNU\/Linux\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> soit g\u00e9n\u00e9ralement plus s\u00e9curis\u00e9 que d&rsquo;autres syst\u00e8mes d&rsquo;exploitation, il n&rsquo;est pas compl\u00e8tement \u00e0 l&rsquo;abri des attaques malveillantes. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png\" alt=\"Image cyberpunk de DarkTux qu'est pas content\" class=\"wp-image-26290\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png 640w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware-300x300.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware-150x150.png 150w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware-180x180.png 180w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Pourquoi Linux n&rsquo;est pas \u00e0 l&rsquo;abri des virus<\/h2>\n\n\n\n<p>Plusieurs <strong>virus<\/strong> et <strong>vuln\u00e9rabilit\u00e9s<\/strong> ont \u00e9t\u00e9 d\u00e9couverts au fil des ans, d\u00e9montrant que <strong>Linux<\/strong> n&rsquo;est pas aussi immunis\u00e9 qu&rsquo;on ne le pense contre les <a href=\"https:\/\/www.checkpoint.com\/fr\/cyber-hub\/cyber-security\/what-is-cybersecurity\/top-6-cybersecurity-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">menaces informatiques<\/a>.<\/p>\n\n\n\n<p>Les premiers virus Linux, tels que <a href=\"https:\/\/www.unixmen.com\/meet-linux-viruses\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Staog<\/strong> et <strong>Bliss<\/strong><\/a>, ont \u00e9t\u00e9 identifi\u00e9s il y a plusieurs d\u00e9cennies, prouvant que le syst\u00e8me n&rsquo;est pas inviolable. De plus, des vuln\u00e9rabilit\u00e9s r\u00e9centes dans des programmes essentiels comme <a href=\"https:\/\/www.kiwi-backup.com\/kiwipedia\/actualites-securite-donnees\/faille-de-securite-sur-les-serveurs-linux\" target=\"_blank\" rel=\"noreferrer noopener\">XZ<\/a> Utils ont mis en lumi\u00e8re les risques potentiels pour les utilisateurs <strong>Linux<\/strong>. En outre, des exemples de malware comme <a href=\"https:\/\/linuxconfig.org\/can-linux-get-viruses-exploring-the-vulnerability-of-linux-systems\" target=\"_blank\" rel=\"noreferrer noopener\">Linux.Wifatch et Linux.Encoder.1<\/a> montrent que les syst\u00e8mes Linux peuvent \u00eatre infect\u00e9s par des vers et des ransomwares.<\/p>\n\n\n\n<p>Dans ce post nous allons voir pourquoi il est crucial de rester vigilant face aux menaces informatiques, m\u00eame sur ce syst\u00e8me d&rsquo;exploitation r\u00e9put\u00e9 s\u00e9curis\u00e9. Nous allons faire connaissance avec 2 outil: <strong>ClamAV<\/strong> et <strong>rkhunter<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">ClamAV<\/h1>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/ClamAV_Logo-150x150.png\" alt=\"Logo de ClamAV\" class=\"wp-image-26299\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/ClamAV_Logo-150x150.png 150w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/ClamAV_Logo-180x180.png 180w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/ClamAV_Logo.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/www.clamav.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">ClamAV<\/a> (Clam AntiVirus) alias \u00ab\u00a0la tomate v\u00e9n\u00e8re\u00a0\u00bb est un <a href=\"https:\/\/www.techno-science.net\/definition\/502.html\" target=\"_blank\" rel=\"noreferrer noopener\">logiciel antivirus open source,<\/a> principalement utilis\u00e9 sur les syst\u00e8mes <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Unix\" target=\"_blank\" rel=\"noreferrer noopener\">Unix<\/a>, <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Linux\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>, mais \u00e9galement disponible pour <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Microsoft_Windows\" target=\"_blank\" rel=\"noreferrer noopener\">Windows<\/a> et <a href=\"https:\/\/fr.wikipedia.org\/wiki\/MacOS\" target=\"_blank\" rel=\"noreferrer noopener\">macOS<\/a>. Il est souvent utilis\u00e9 avec les <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Serveur_de_messagerie_%C3%A9lectronique\" target=\"_blank\" rel=\"noreferrer noopener\">serveurs de messagerie<\/a> pour filtrer les emails contenant des virus, bien que les syst\u00e8mes sur lesquels il s&rsquo;ex\u00e9cute soient moins vuln\u00e9rables aux menaces qu&rsquo;il d\u00e9tecte, qui sont principalement cibl\u00e9es vers Microsoft Windows.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Caract\u00e9ristiques Cl\u00e9s<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Licence : ClamAV est distribu\u00e9 sous <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Licence_publique_g%C3%A9n%C3%A9rale_GNU\" target=\"_blank\" rel=\"noreferrer noopener\">licence GPL<\/a>, ce qui signifie qu&rsquo;il est gratuit et <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Open_source\" target=\"_blank\" rel=\"noreferrer noopener\">open source<\/a>.<\/li>\n\n\n\n<li>Utilisation : Il est tr\u00e8s utilis\u00e9 pour la d\u00e9tection de divers types de menaces, y compris les virus, les <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Cheval_de_Troie_(informatique)\" target=\"_blank\" rel=\"noreferrer noopener\">chevaux de Troie<\/a> (trojan), les <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Logiciel_espion\" target=\"_blank\" rel=\"noreferrer noopener\">logiciels espions<\/a> (spyware), et les <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Logiciel_malveillant\" target=\"_blank\" rel=\"noreferrer noopener\">scripts malveillants<\/a> (malware).<\/li>\n\n\n\n<li>Mises \u00e0 jour : ClamAV se met \u00e0 jour automatiquement pour inclure de nouvelles signatures de virus, ce qui permet une d\u00e9tection efficace des menaces \u00e9mergentes.<\/li>\n\n\n\n<li>Plateformes : Disponible sur plusieurs plateformes, y compris Linux, Windows, et macOS.<\/li>\n\n\n\n<li>Impact sur les performances : ClamAV a un impact minimal sur les performances du syst\u00e8me, ce qui le rend adapt\u00e9 aux syst\u00e8mes moins puissants.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Interfaces Graphiques<\/h3>\n\n\n\n<p>Pour une utilisation plus conviviale, il existe des interfaces graphiques comme <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/ClamTk\" target=\"_blank\" rel=\"noreferrer noopener\">Clamtk<\/a><\/strong> pour <a href=\"https:\/\/fr.wikipedia.org\/wiki\/GTK_(bo%C3%AEte_%C3%A0_outils)\" target=\"_blank\" rel=\"noreferrer noopener\">GTK<\/a> et <strong><a href=\"https:\/\/www.thinkpenguin.com\/gnu-linux\/klamav\" target=\"_blank\" rel=\"noreferrer noopener\">KlamAV<\/a><\/strong> pour <a href=\"https:\/\/fr.wikipedia.org\/wiki\/KDE\" target=\"_blank\" rel=\"noreferrer noopener\">KDE<\/a>. Sous <strong>macOS<\/strong>, <strong><a href=\"https:\/\/www.clamxav.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ClamXAV<\/a><\/strong> est une version sp\u00e9cifique qui utilise le moteur de d\u00e9tection <strong>ClamAV<\/strong>. Dans ce post nous allons regarder rapidement <strong>Clamtk<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Installation<\/h3>\n\n\n\n<p>L&rsquo;installation est tr\u00e8s simple. Vous pouvez t\u00e9l\u00e9charger et installer le fichier correspondant \u00e0 votre syst\u00e8me d&rsquo;exploitation <a href=\"https:\/\/www.clamav.net\/downloads\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>. <\/p>\n\n\n\n<p>Si vous \u00eates sous une distrib Linux <a href=\"https:\/\/fr.techtribune.net\/linux\/les-10-meilleures-distributions-linux-basees-sur-debian-pour-les-debutants-comme-moi\/595430\/\" target=\"_blank\" rel=\"noreferrer noopener\">Debian-based<\/a>, juste <code>sudo apt get install clamav<\/code> (Pour les autres, il faudra l t\u00e9l\u00e9charger, d\u00e9compresser et ex\u00e9cuter)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mise \u00e0 jour des signatures<\/h3>\n\n\n\n<p>Avant de commencer \u00e0 utiliser <strong>ClamAV<\/strong>, il faut tout d&rsquo;abord mettre \u00e0 jour la base de donn\u00e9es de ClamAV contenant les <a href=\"https:\/\/bitdefender.solutions-antivirus.com\/blog\/astucesetconseils\/signatures-de-virus\" target=\"_blank\" rel=\"noreferrer noopener\">signatures virales<\/a> connues, ce qui permettra ensuite de les d\u00e9tecter lors des scans. <\/p>\n\n\n\n<p><code>sudo freshclam<\/code><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"145\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-freshclam.png\" alt=\"Commande freshclam\" class=\"wp-image-26770\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-freshclam.png 653w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-freshclam-300x67.png 300w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Scan manuel<\/h3>\n\n\n\n<p>Avec ClamAV, vous pouvez comme sur la plupart des antivirus scanner un disque complet, un dossier, un fichier. Son utilisation est tr\u00e8s intuitive. Il vous suffira d&rsquo;utiliser la commande <code>clamscan<\/code> suivi du chemin souhait\u00e9.<\/p>\n\n\n\n<p>Voici quelques exemples pour les syst\u00e8mes UNIX\/Linux<\/p>\n\n\n\n<p><code>sudo clamscan \/<\/code> (Pour scanner tout le disque)<\/p>\n\n\n\n<p><code>sudo clamscan \/home\/Toto\/Dowloads<\/code> (Pour scanner tout le dossier de t\u00e9l\u00e9chargement de l&rsquo;utilisateur Toto)<\/p>\n\n\n\n<p><code>sudo clamscan \/home\/Toto\/Documents\/recette-de-ratatouille.pdf<\/code> (Pour scanner un fichier <strong>PDF<\/strong> pr\u00e9cis)<\/p>\n\n\n\n<p><code>sudo clamscan \/home\/Toto\/Dowloads -log=report.log<\/code> (Pour sauvegarder le r\u00e9sultat dans un fichier de log)<\/p>\n\n\n\n<p><code>sudo clamscan \/home\/Toto\/Dowloads --remove=yes<\/code> (Pour supprimer automatique les fichiers malicieux) <\/p>\n\n\n\n<p>On peut bien entendu combiner plusieurs options:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"721\" height=\"720\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3.png\" alt=\"R\u00e9sultats de scan de ClamAV\" class=\"wp-image-26771\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3.png 721w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3-300x300.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3-150x150.png 150w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3-640x640.png 640w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamscan3-180x180.png 180w\" sizes=\"auto, (max-width: 721px) 100vw, 721px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Protection en temps r\u00e9el<\/h3>\n\n\n\n<p>Il est possible d&rsquo;utiliser aussi ClamAV comme un antivirus \u00e0 la Windows, qui v\u00e9rifie en temps r\u00e9el l&rsquo;ensemble du syst\u00e8me ou seulement un ou plusieurs dossiers que vous aurez param\u00e9tr\u00e9s. Ce n&rsquo;est pas tr\u00e8s compliqu\u00e9 \u00e0 mettre en place, si vous souhaitez optimiser cette partie, tout est expliqu\u00e9 dans la <a href=\"https:\/\/docs.clamav.net\/manual\/OnAccess.html\" target=\"_blank\" rel=\"noreferrer noopener\">documentation officielle<\/a>. Mais nous irons ici droit au but pour une utilisation simple qui vous permettra de tester cette fonction rapidement.<\/p>\n\n\n\n<p>Si ce n&rsquo;est pas d\u00e9j\u00e0 fait, vous pouvez installer le daemon: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install clamav-daemon<\/code><\/pre>\n\n\n\n<p>Vous pouvez alors le d\u00e9marrer avec systemctl et v\u00e9rifier que le status est bien sur <strong>enabled<\/strong> et <strong>active<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl start clamav-daemon\nsudo systemctl status clamav-daemon<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"491\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-daemon-start.png\" alt=\"D\u00e9marrer et activer le daemon de ClamAV\" class=\"wp-image-26772\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-daemon-start.png 769w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-daemon-start-300x192.png 300w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><\/figure>\n<\/div>\n\n\n<p>Pour qu&rsquo;il se lance automatiquement au d\u00e9marrage du PC vous pouvez aussi ajouter: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl enable clamav-daemon<\/code><\/pre>\n\n\n\n<p>Nous pouvons mainteant configurer le OnAccess en \u00e9diant le fichier <strong>clamd.conf<\/strong> :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/clamav\/clamd.conf<\/code><\/pre>\n\n\n\n<p>Vous pouvez simplement ajouter ou adapter selons vos besoins les options suivantes: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>OnAccessIncludePath \/home   # R\u00e9pertoire \u00e0 surveiller (ex: \/home, \/, etc.)\nOnAccessPrevention yes      # Bloquer les fichiers malveillants\nOnAccessMountPath \/         # Point de montage \u00e0 surveiller\nOnAccessExcludeUname clamav  # Exclut utilisateurs ou groupes UNIX sp\u00e9cifiques<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"592\" height=\"121\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf1.png\" alt=\"clamd.ctl dans clamd.conf\" class=\"wp-image-26774\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf1.png 592w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf1-300x61.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"414\" height=\"90\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf2.png\" alt=\"clamav.log et LogTime dans clamd.conf\" class=\"wp-image-26775\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf2.png 414w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamav-conf2-300x65.png 300w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><\/figure>\n<\/div>\n\n\n<p>Quand c&rsquo;est fait et que vous l&rsquo;avez sauvegard\u00e9, vous pouvez taper <code>sudo clamonacc,<\/code> si aucune erreur appara\u00eet alors vous pouvez passer \u00e0 la suite.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Utilisation de la version graphique<\/h3>\n\n\n\n<p>Si vous pr\u00e9f\u00e9rez utiliser une version graphique de ClamAV plut\u00f4t qu&rsquo;en ligne de commande, vous pouvez installer <a href=\"https:\/\/en.wikipedia.org\/wiki\/ClamTk\" target=\"_blank\" rel=\"noreferrer noopener\">ClamTk<\/a>: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install clamtk<\/code><\/pre>\n\n\n\n<p>Vous pouvez ensuite le rechercher dans la liste de vos programmes et cliquer sur son nom<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"574\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-menu.png\" alt=\"Menu de Linux Mint pour d\u00e9marrer ClamTk \" class=\"wp-image-26776\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-menu.png 607w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-menu-300x284.png 300w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/figure>\n<\/div>\n\n\n<p>On peut maintenant voir les diff\u00e9rentes options qu&rsquo;il propose, son utilisation est tr\u00e8s intuitive:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"481\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-preview.png\" alt=\"Options de ClamTk\" class=\"wp-image-26777\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-preview.png 499w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-preview-300x289.png 300w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><\/figure>\n<\/div>\n\n\n<p>On peut voir quelques options qui seront tr\u00e8s pratiques comme le <strong>Scheduler<\/strong> pour plannifier les scans:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"379\" height=\"513\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-scheduler.png\" alt=\"\" class=\"wp-image-26780\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-scheduler.png 379w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-scheduler-222x300.png 222w\" sizes=\"auto, (max-width: 379px) 100vw, 379px\" \/><\/figure>\n<\/div>\n\n\n<p> La section <strong>Quarantine<\/strong> pour voir et g\u00e9rer ce qui a \u00e9t\u00e9 mis en quarantaine: <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"481\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-quarantine.png\" alt=\"Section de quarantaine de ClamTk\" class=\"wp-image-26779\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-quarantine.png 502w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-quarantine-300x287.png 300w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/figure>\n<\/div>\n\n\n<p>Ou bien encore la section <strong>Analysis<\/strong> pour v\u00e9rifier la r\u00e9putation d&rsquo;un fichier:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"452\" height=\"342\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-analysis.png\" alt=\"Section d'analyse de ClamTk\" class=\"wp-image-26778\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-analysis.png 452w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/clamtk-analysis-300x227.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/figure>\n<\/div>\n\n\n<p>D&rsquo;autres fonctions sont disponibles, vous pourrez les d\u00e9couvrir et les tester au fil du temps.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">rkhunter<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"186\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/Rkhunter-logo-300x186.png\" alt=\"Logo de Rkhunter\" class=\"wp-image-26796\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/Rkhunter-logo-300x186.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/Rkhunter-logo.png 485w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p>Pour faire simple, <a href=\"https:\/\/doc.ubuntu-fr.org\/rkhunter\" target=\"_blank\" rel=\"noreferrer noopener\">rkhunter<\/a> est un outil qui permet de d\u00e9tecter les <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Rootkit\" target=\"_blank\" rel=\"noreferrer noopener\">rootkits<\/a>, <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Porte_d%C3%A9rob%C3%A9e\" target=\"_blank\" rel=\"noreferrer noopener\">backdoors<\/a> et autres types de menaces ocmme des <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Exploit_(informatique)\" target=\"_blank\" rel=\"noreferrer noopener\">exploits<\/a> qui pourraient impacter des syst\u00e8mes UNIX et Linux. Il v\u00e9rifie les hashes <a href=\"https:\/\/fr.wikipedia.org\/wiki\/SHA-2\" target=\"_blank\" rel=\"noreferrer noopener\">SHA256<\/a>, <a href=\"https:\/\/fr.wikipedia.org\/wiki\/SHA-2\" target=\"_blank\" rel=\"noreferrer noopener\">SHA512<\/a>, <a href=\"https:\/\/fr.wikipedia.org\/wiki\/SHA-1\" target=\"_blank\" rel=\"noreferrer noopener\">SH1<\/a> et <a href=\"https:\/\/fr.wikipedia.org\/wiki\/MD5\" target=\"_blank\" rel=\"noreferrer noopener\">MD5<\/a> des fichiers importants, fichiers cach\u00e9s, permissions, en les comparant avec les hashes connus, disponibles dans une base de donn\u00e9es. Si un hash est diff\u00e9rent de celui de la base de donn\u00e9e, alors il a \u00e9t\u00e9 modifi\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Installation<\/h3>\n\n\n\n<p>Rien de plus simple: <code>sudo apt install rkhunter<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Utilisation<\/h2>\n\n\n\n<p>Vous pouvez tout d&rsquo;abord mettre la base \u00e0 jour:<\/p>\n\n\n\n<p><code>sudo rkhunter --update<\/code><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"567\" height=\"48\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_error.png\" alt=\"Mise \u00e0 jour de Rkhunter\" class=\"wp-image-26786\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_error.png 567w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_error-300x25.png 300w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/figure>\n<\/div>\n\n\n<p>Si vous obtenez cette m\u00eame erreur, rien de dramatique, il suffit d&rsquo;\u00e9diter le fichier <strong>\/etc\/rkhunter.conf<\/strong> :<\/p>\n\n\n\n<p><code>sudo vim \/etc\/rkhunter.conf<\/code><\/p>\n\n\n\n<p>Et vous pouvez apporter les modifications suivantes:<\/p>\n\n\n\n<p>Remplacez <strong>0 par 1 pour UPDATE_MIRRORS<\/strong> et remplacez <strong>1 par 0 pour MIRRORS_MODE<\/strong>:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"366\" height=\"362\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_UPDATE_MIRRORS_and_MIRRORS_MODE.png\" alt=\"Activation de UPDATE_MIRRORS et d\u00e9sactivation de MIRRORS_MODE dans rkhunter.conf\" class=\"wp-image-26787\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_UPDATE_MIRRORS_and_MIRRORS_MODE.png 366w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_UPDATE_MIRRORS_and_MIRRORS_MODE-300x297.png 300w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/figure>\n<\/div>\n\n\n<p>Supprimez le chemin indiqu\u00e9 pour <code><strong>WEB_CMD=\"\/bin\/false\"<\/strong><\/code> pour ne garder que les guillemets:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"266\" height=\"176\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_WEB_CMD.png\" alt=\"Suppression du chemin de WEB_CMD dans rkhunter.conf\" class=\"wp-image-26788\"\/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Maintenant vous pouvez \u00e0 nouveau ex\u00e9cuter <code>sudo rkhunter --update<\/code><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"627\" height=\"282\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_update.png\" alt=\"Nouvelle mise \u00e0 jour de Rkhunter\" class=\"wp-image-26789\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_update.png 627w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_update-300x135.png 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/figure>\n<\/div>\n\n\n<p>Maintenant que tout est corrig\u00e9, vous pouvez lister les tests disponibles avec <code>sudo rkhunter --list<\/code>: <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"949\" height=\"976\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_list.png\" alt=\"Liste des tests disponibles dans Rkhunter\" class=\"wp-image-26790\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_list.png 949w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_list-292x300.png 292w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_list-768x790.png 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/figure>\n<\/div>\n\n\n<p>Si vous voulez simplement v\u00e9rifier l&rsquo;ensemble du syst\u00e8me: <code>sudo rkhunter --checkall<\/code><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"608\" height=\"983\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_checkall.png\" alt=\"V\u00e9rification de tout le syst\u00e8me par Rkhunter\" class=\"wp-image-26791\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_checkall.png 608w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/rkhunter_checkall-186x300.png 186w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/figure>\n<\/div>\n\n\n<p>Pour n&rsquo;avoir que les alertes, vous pouvez aussi ajouter l&rsquo;option <code>--report-warnings-only<\/code> . <\/p>\n\n\n\n<p>Vous pouvez maintenant l&rsquo;ajouter \u00e0 Crontab pour automatiser le scan, il vous suffira quand vous avez un peu de temps de consulter le fichier de log qui se trouve par d\u00e9faut dans <strong>\/var\/log\/rkhunter.log<\/strong> . Vous pouvez modifier son emplacement avec l&rsquo;option <code>-l<\/code> .<\/p>\n\n\n\n<p>Enfin, apr\u00e8s une mise \u00e0 jour du syst\u00e8me, vous pouvez aussi mettre \u00e0 jour la base de rkhunter avec <code>sudo rkhunter --propupd<\/code> afin qu&rsquo;il prenne en compte aussi les nouveaut\u00e9s \/ changements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Maintenant, vous avez au moins 2 outils pour analyser votre syst\u00e8me, que ce soit manuellement ou automatiquement. Gardez bien en t\u00eate que m\u00eame si les distrib <strong>Linux<\/strong> sont moins cibl\u00e9es et moins vuln\u00e9rables que <strong>Windows<\/strong>, elles ne sont pas 100% s\u00e9curis\u00e9es, rien ne l&rsquo;est. On voit r\u00e9guli\u00e8rement et de plus en plus, comme <a href=\"https:\/\/www.zdnet.fr\/actualites\/linux-une-vulnerabilite-grave-affecte-presque-presque-toutes-les-distributions-39961684.htm\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a> ou <a href=\"https:\/\/korben.info\/faille-rce-critique-linux-cauchemar-admins.html\" target=\"_blank\" rel=\"noreferrer noopener\">l\u00e0<\/a>, une nouvelle attaque, une nouvelle vuln\u00e9rabilit\u00e9, une nouvelle faiblesse ou un nouveau bug qui touche aussi <strong>Linux<\/strong>. <\/p>\n\n\n\n<p>Restez prudent, restez vigilant, restez constant. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/tux-the-knight.png\" alt=\"Le petit Tux vient d'\u00eatre adoub\u00e9. Ouais c'est pas faux!\" class=\"wp-image-26795\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/tux-the-knight.png 640w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/tux-the-knight-300x300.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/tux-the-knight-150x150.png 150w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/tux-the-knight-180x180.png 180w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Il est courant d&rsquo;entendre que Linux est un syst\u00e8me d&rsquo;exploitation inviolable, exempt de virus et de menaces informatiques. Cependant, cette perception est loin de la r\u00e9alit\u00e9. Bien que Linux soit<a href=\"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/\" class=\"more-link\"><span class=\"readmore\">Continue reading<span class=\"screen-reader-text\">Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux<\/span><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[8,105,60],"tags":[59],"class_list":["post-26287","post","type-post","status-publish","format-standard","hentry","category-hacking","category-linux","category-securite","tag-tutoriel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Faisons un test de 2 antivirus pour Linux et voyons s&#039;ils sont utiles<\/title>\n<meta name=\"description\" content=\"Linux n&#039;est pas invuln\u00e9rable, comme n&#039;imoprte quel syst\u00e8me d&#039;exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Faisons un test de 2 antivirus pour Linux et voyons s&#039;ils sont utiles\" \/>\n<meta property=\"og:description\" content=\"Linux n&#039;est pas invuln\u00e9rable, comme n&#039;imoprte quel syst\u00e8me d&#039;exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Cryptrz\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-07T10:07:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T03:40:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cryptrz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cryptrz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/\"},\"author\":{\"name\":\"cryptrz\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"headline\":\"Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux\",\"datePublished\":\"2025-03-07T10:07:46+00:00\",\"dateModified\":\"2025-05-14T03:40:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/\"},\"wordCount\":1296,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/linux_malware.png\",\"keywords\":[\"tutoriel\"],\"articleSection\":[\"Hacking\",\"Linux\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/\",\"name\":\"Faisons un test de 2 antivirus pour Linux et voyons s'ils sont utiles\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/linux_malware.png\",\"datePublished\":\"2025-03-07T10:07:46+00:00\",\"dateModified\":\"2025-05-14T03:40:57+00:00\",\"description\":\"Linux n'est pas invuln\u00e9rable, comme n'imoprte quel syst\u00e8me d'exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/linux_malware.png\",\"contentUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/linux_malware.png\",\"width\":640,\"height\":640},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2025\\\/03\\\/07\\\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#website\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/\",\"name\":\"Cryptrz\",\"description\":\"Franck Ridel\",\"publisher\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"alternateName\":\"Franck Ridel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\",\"name\":\"cryptrz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"contentUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"cryptrz\"},\"logo\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\"},\"description\":\"Sysadmin de Luxembourg House of Cybersecurity fan d'open source et autres Unixeries\",\"sameAs\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/franck-ridel\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@FranckRidel\",\"https:\\\/\\\/soundcloud.com\\\/franck-ridel-2\"],\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/author\\\/cryptrz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Faisons un test de 2 antivirus pour Linux et voyons s'ils sont utiles","description":"Linux n'est pas invuln\u00e9rable, comme n'imoprte quel syst\u00e8me d'exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/","og_locale":"fr_FR","og_type":"article","og_title":"Faisons un test de 2 antivirus pour Linux et voyons s'ils sont utiles","og_description":"Linux n'est pas invuln\u00e9rable, comme n'imoprte quel syst\u00e8me d'exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter","og_url":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/","og_site_name":"Cryptrz","article_published_time":"2025-03-07T10:07:46+00:00","article_modified_time":"2025-05-14T03:40:57+00:00","og_image":[{"width":640,"height":640,"url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png","type":"image\/png"}],"author":"cryptrz","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"cryptrz","Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#article","isPartOf":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/"},"author":{"name":"cryptrz","@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"headline":"Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux","datePublished":"2025-03-07T10:07:46+00:00","dateModified":"2025-05-14T03:40:57+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/"},"wordCount":1296,"commentCount":0,"publisher":{"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"image":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png","keywords":["tutoriel"],"articleSection":["Hacking","Linux","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/","url":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/","name":"Faisons un test de 2 antivirus pour Linux et voyons s'ils sont utiles","isPartOf":{"@id":"https:\/\/cryptrz.org\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#primaryimage"},"image":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png","datePublished":"2025-03-07T10:07:46+00:00","dateModified":"2025-05-14T03:40:57+00:00","description":"Linux n'est pas invuln\u00e9rable, comme n'imoprte quel syst\u00e8me d'exploitation. Nous allons voir comment scanner votre PC avec ClamAV et rkhunter","breadcrumb":{"@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#primaryimage","url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png","contentUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2025\/03\/linux_malware.png","width":640,"height":640},{"@type":"BreadcrumbList","@id":"https:\/\/cryptrz.org\/wordpress\/2025\/03\/07\/tour-dhorizon-de-clamav-et-rkhunter-sous-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cryptrz.org\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Tour d&rsquo;horizon de ClamAV et rkhunter sous Linux"}]},{"@type":"WebSite","@id":"https:\/\/cryptrz.org\/wordpress\/#website","url":"https:\/\/cryptrz.org\/wordpress\/","name":"Cryptrz","description":"Franck Ridel","publisher":{"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"alternateName":"Franck Ridel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptrz.org\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec","name":"cryptrz","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","contentUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","width":1024,"height":1024,"caption":"cryptrz"},"logo":{"@id":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg"},"description":"Sysadmin de Luxembourg House of Cybersecurity fan d'open source et autres Unixeries","sameAs":["https:\/\/cryptrz.org\/wordpress","https:\/\/www.linkedin.com\/in\/franck-ridel\/","https:\/\/www.youtube.com\/@FranckRidel","https:\/\/soundcloud.com\/franck-ridel-2"],"url":"https:\/\/cryptrz.org\/wordpress\/author\/cryptrz\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/26287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/comments?post=26287"}],"version-history":[{"count":49,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/26287\/revisions"}],"predecessor-version":[{"id":33109,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/26287\/revisions\/33109"}],"wp:attachment":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/media?parent=26287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/categories?post=26287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/tags?post=26287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}