Linux中用find命令找出隐藏文件和目录

[root@localhost log]# find /t -name ".*" -printf
find: missing argument to `-printf'
[root@localhost log]# find /t -name ".*" -print
/t/home/drosen/.emacs
/t/home/drosen/.bash_logout
/t/home/drosen/.bash_profile
/t/home/drosen/.bashrc
/t/home/drosen/.screenrc
/t/home/drosen/.bash_history
/t/usr/doc/bind-8.2.2_P5/bog/.cvsignore
/t/usr/doc/pmake-2.1.34/tests/.purify
/t/usr/doc/samba-2.0.6/docs/yodldocs/.cvsignore
/t/usr/doc/ucd-snmp-4.1.1/local/.cvsignore
/t/usr/lib/perl5/5.00503/i386-linux/.packlist
/t/usr/lib/perl5/site_perl/5.005/i386-linux/auto/MD5/.packlist
/t/usr/lib/perl5/site_perl/5.005/i386-linux/auto/mod_perl/.packlist
/t/usr/lib/linuxconf/install/gnome/.directory
/t/usr/lib/linuxconf/install/gnome/.order
/t/usr/man/man1/..1.gz
/t/usr/man/.Ci
/t/usr/man/.p
/t/usr/man/.a
/t/usr/bin/.gitaction
/t/usr/games/.bash_history
/t/usr/share/git/.gitrc.aixterm
/t/usr/share/git/.gitrc.common
/t/usr/share/git/.gitrc.hft
/t/usr/share/git/.gitrc.hpterm
/t/usr/share/git/.gitrc.hp
/t/usr/share/git/.gitrc.iris-ansi-net
/t/usr/share/git/.gitrc.ansi
/t/usr/share/git/.gitrc.iris-ansi
/t/usr/share/git/.gitrc.linux
/t/usr/share/git/.gitrc.console
/t/usr/share/git/.gitrc.mach
/t/usr/share/git/.gitrc.minix
/t/usr/share/git/.gitrc.sun-cmd
/t/usr/share/git/.gitrc.eterm
/t/usr/share/git/.gitrc.generic
/t/usr/share/git/.gitrc.pc3
/t/usr/share/git/.gitrc.sun
/t/usr/share/git/.gitrc.thix
/t/usr/share/git/.gitrc.vt102
/t/usr/share/git/.gitrc.vt420
/t/usr/share/git/.gitrc.screen
/t/usr/share/git/.gitrc.vt100
/t/usr/share/git/.gitrc.vt125
/t/usr/share/git/.gitrc.vt200
/t/usr/share/git/.gitrc.vt201
/t/usr/share/git/.gitrc.vt220
/t/usr/share/git/.gitrc.vt240
/t/usr/share/git/.gitrc.vt300
/t/usr/share/git/.gitrc.vt320
/t/usr/share/git/.gitrc.vt400
/t/usr/share/git/.gitrc.xterm-debian
/t/usr/share/git/.gitrc.dtterm
/t/usr/share/git/.gitrc.rxvt
/t/usr/share/git/.gitrc.xterm-color
/t/usr/share/git/.gitrc.xterms
/t/usr/share/git/.gitrc.xterm
/t/var/lib/news/.news.daily
/t/var/spool/at/.SEQ
/t/tmp/.font-unix
/t/tmp/.bash_history
/t/etc/.pwd.lock
/t/etc/skel/.emacs
/t/etc/skel/.bash_logout
/t/etc/skel/.bash_profile
/t/etc/skel/.bashrc
/t/etc/skel/.screenrc
/t/lib/modules/2.2.14-5.0/.rhkmvtag
/t/root/.Xdefaults
/t/root/.bash_logout
/t/root/.bash_profile
/t/root/.bashrc
/t/root/.cshrc
/t/root/.tcshrc
/t/root/.bash_history
/t/root/.ssh
/t/.bash_history
/t/.automount
[root@localhost log]#
 以上的输出是我正在研究的一台被黑的机器的景象硬盘中输出的结果,可以清晰的看到很多有价值的东西。

详细分析这个被入侵的系统的方法我以后会慢慢写出来的来帮助大家一起提高技术。

发布了1444 篇原创文章 · 获赞 110 · 访问量 681万+
展开阅读全文

没有更多推荐了,返回首页

©️2019 CSDN 皮肤主题: 大白 设计师: CSDN官方博客

分享到微信朋友圈

×

扫一扫,手机浏览