Tag

Rootkit

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Aug 15, 2023 · Information Security

How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response

This article details a real‑world Linux server intrusion, describing the observed symptoms, the forensic investigation using commands like ps, top, last, and grep, the removal of malicious cron jobs and backdoors, and the lessons learned for securing SSH, file attributes, and cloud security groups.

CronRootkitSSH
0 likes · 15 min read
How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

CronIntrusion DetectionRootkit
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
DevOps Operations Practice
DevOps Operations Practice
Sep 26, 2022 · Information Security

Top Linux Antivirus Software: Reviews and Recommendations

This article reviews the most effective Linux antivirus solutions, explains why antivirus protection is still needed on Linux servers despite the platform's inherent security, and provides detailed descriptions of each tool along with installation guidance and usage tips.

Malware ProtectionOpen SourceRootkit
0 likes · 8 min read
Top Linux Antivirus Software: Reviews and Recommendations
Efficient Ops
Efficient Ops
Sep 13, 2022 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server compromise, describing the symptoms, possible causes, investigative commands, hidden malicious scripts, file attribute locks, and practical remediation steps to restore the system and improve future security.

CronIntrusion DetectionRootkit
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Jan 24, 2021 · Information Security

How to Harden Linux Servers: Essential Security Practices Every Ops Engineer Should Know

This guide outlines comprehensive Linux security hardening steps—including account protection, service minimization, password policies, sudo usage, file system safeguards, rootkit detection tools, and post‑attack response—to help operations teams secure their servers against common threats.

HardeningRootkitSysadmin
0 likes · 26 min read
How to Harden Linux Servers: Essential Security Practices Every Ops Engineer Should Know
Efficient Ops
Efficient Ops
Jan 13, 2021 · Information Security

How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis

This article walks through a real‑world Linux mining malware infection, detailing how the attacker hid a malicious cron job, used LD_PRELOAD rootkits, propagated via SSH keys, and how the analyst uncovered and removed the threat using busybox, strace, and careful forensic commands.

Linux securityRootkitcryptocurrency mining
0 likes · 12 min read
How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis
Efficient Ops
Efficient Ops
Apr 7, 2020 · Information Security

How to Detect and Remediate a Linux Rootkit Attack: A Step‑by‑Step Case Study

This article walks through a real‑world Linux server compromise, detailing the symptoms, forensic commands, rootkit discovery, attack vector via an Awstats vulnerability, and provides a comprehensive recovery checklist for securing the system.

Rootkitawstatsincident response
0 likes · 13 min read
How to Detect and Remediate a Linux Rootkit Attack: A Step‑by‑Step Case Study
Efficient Ops
Efficient Ops
Feb 12, 2020 · Information Security

Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection

This guide presents a comprehensive Linux security hardening checklist covering account and login safety, unnecessary service removal, password and key authentication policies, sudo usage, filesystem protection, remote access safeguards, rootkit detection tools, and step‑by‑step incident response for compromised servers.

Account ManagementHardeningRootkit
0 likes · 27 min read
Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection