Tag

forensics

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Server Intrusionchattrcron jobs
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Jan 5, 2017 · Information Security

How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response

After a sudden traffic surge and loss of SSH access on an Ubuntu 12.04 server, I worked with the data‑center team to trace malicious outbound connections, identify compromised binaries, remove persistent backdoor scripts, and implement firewall rules and logging practices to prevent future intrusions.

forensicsincident responseiptables
0 likes · 8 min read
How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response
Architects Research Society
Architects Research Society
Sep 12, 2016 · Information Security

Intro to Computer and Network Security: Curated Learning Resources

This guide compiles essential papers, tools, virtual machines, datasets, and training sites to help learners deepen their understanding of computer and network security through both theoretical study and hands‑on practice.

Virtual Machinescybersecurityforensics
0 likes · 6 min read
Intro to Computer and Network Security: Curated Learning Resources