天天看点

Linux中用find命令找出隐藏文件和目录

[root@localhost log]# find /t -name ".*" -printf

find: missing argument to `-printf'

[root@localhost log]# find /t -name ".*" -print

/t/home/drosen/.emacs

/t/home/drosen/.bash_logout

/t/home/drosen/.bash_profile

/t/home/drosen/.bashrc

/t/home/drosen/.screenrc

/t/home/drosen/.bash_history

/t/usr/doc/bind-8.2.2_P5/bog/.cvsignore

/t/usr/doc/pmake-2.1.34/tests/.purify

/t/usr/doc/samba-2.0.6/docs/yodldocs/.cvsignore

/t/usr/doc/ucd-snmp-4.1.1/local/.cvsignore

/t/usr/lib/perl5/5.00503/i386-linux/.packlist

/t/usr/lib/perl5/site_perl/5.005/i386-linux/auto/MD5/.packlist

/t/usr/lib/perl5/site_perl/5.005/i386-linux/auto/mod_perl/.packlist

/t/usr/lib/linuxconf/install/gnome/.directory

/t/usr/lib/linuxconf/install/gnome/.order

/t/usr/man/man1/..1.gz

/t/usr/man/.Ci

/t/usr/man/.p

/t/usr/man/.a

/t/usr/bin/.gitaction

/t/usr/games/.bash_history

/t/usr/share/git/.gitrc.aixterm

/t/usr/share/git/.gitrc.common

/t/usr/share/git/.gitrc.hft

/t/usr/share/git/.gitrc.hpterm

/t/usr/share/git/.gitrc.hp

/t/usr/share/git/.gitrc.iris-ansi-net

/t/usr/share/git/.gitrc.ansi

/t/usr/share/git/.gitrc.iris-ansi

/t/usr/share/git/.gitrc.linux

/t/usr/share/git/.gitrc.console

/t/usr/share/git/.gitrc.mach

/t/usr/share/git/.gitrc.minix

/t/usr/share/git/.gitrc.sun-cmd

/t/usr/share/git/.gitrc.eterm

/t/usr/share/git/.gitrc.generic

/t/usr/share/git/.gitrc.pc3

/t/usr/share/git/.gitrc.sun

/t/usr/share/git/.gitrc.thix

/t/usr/share/git/.gitrc.vt102

/t/usr/share/git/.gitrc.vt420

/t/usr/share/git/.gitrc.screen

/t/usr/share/git/.gitrc.vt100

/t/usr/share/git/.gitrc.vt125

/t/usr/share/git/.gitrc.vt200

/t/usr/share/git/.gitrc.vt201

/t/usr/share/git/.gitrc.vt220

/t/usr/share/git/.gitrc.vt240

/t/usr/share/git/.gitrc.vt300

/t/usr/share/git/.gitrc.vt320

/t/usr/share/git/.gitrc.vt400

/t/usr/share/git/.gitrc.xterm-debian

/t/usr/share/git/.gitrc.dtterm

/t/usr/share/git/.gitrc.rxvt

/t/usr/share/git/.gitrc.xterm-color

/t/usr/share/git/.gitrc.xterms

/t/usr/share/git/.gitrc.xterm

/t/var/lib/news/.news.daily

/t/var/spool/at/.SEQ

/t/tmp/.font-unix

/t/tmp/.bash_history

/t/etc/.pwd.lock

/t/etc/skel/.emacs

/t/etc/skel/.bash_logout

/t/etc/skel/.bash_profile

/t/etc/skel/.bashrc

/t/etc/skel/.screenrc

/t/lib/modules/2.2.14-5.0/.rhkmvtag

/t/root/.Xdefaults

/t/root/.bash_logout

/t/root/.bash_profile

/t/root/.bashrc

/t/root/.cshrc

/t/root/.tcshrc

/t/root/.bash_history

/t/root/.ssh

/t/.bash_history

/t/.automount

[root@localhost log]#

 以上的输出是我正在研究的一台被黑的机器的景象硬盘中输出的结果,可以清晰的看到很多有价值的东西。

详细分析这个被入侵的系统的方法我以后会慢慢写出来的来帮助大家一起提高技术。

继续阅读