Comprehensive Linux Intrusion Detection Checklist: Accounts, Logs, Processes, and Files

This guide outlines a step‑by‑step Linux intrusion detection workflow, covering account audits, log inspection, process examination, file integrity checks, scheduled task reviews, and command‑history analysis to help identify potential compromises.

Liangxu Linux
Liangxu Linux
Liangxu Linux
Comprehensive Linux Intrusion Detection Checklist: Accounts, Logs, Processes, and Files

Check Accounts

Inspect the system for newly created users, accounts with UID or GID 0 (root privileges), and users with empty passwords. Identify which accounts have root rights and examine the modification dates of user files.

图片
图片
图片
图片
图片
图片
图片
图片
图片
图片

Check Logs

System logs are crucial for security auditing; they record daily events and can reveal error causes or attacker footprints. Use them to audit and monitor system status, trace intrusions, and verify recent activity.

View the last 10 lines of relevant logs.

图片
图片

Check recent updates and system events.

图片
图片

List all open ports.

图片
图片

Review recent user login times.

图片
图片

Check failed login attempts.

图片
图片

Inspect the previous login record of each user.

图片
图片

Check Processes

List all running processes, paying special attention to those with UID 0.

图片
图片

Examine files opened by a specific process using its PID (e.g., lsof -p PID).

图片
图片

Inspect files associated with daemon processes.

图片
图片

Check startup processes that run at boot.

图片
图片

Check System Files

Identify modified or suspicious files on the system. Compromised servers often have altered files; compare creation times, integrity hashes, and file paths.

图片
图片

Search for files owned by the root user.

图片
图片

Locate files larger than 10 MB, which may indicate hidden payloads.

图片
图片

Check Scheduled Tasks

Review root's cron jobs and other scheduled tasks for suspicious entries.

图片
图片

Inspect the configuration files of scheduled tasks.

图片
图片
图片
图片

Check Command History

Examine each user's .bash_history file or use the history command to uncover previously executed commands that may indicate malicious activity.

图片
图片
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

log analysisfile integrityintrusion detectionprocess monitoringSecurity AuditingAccount Review
Liangxu Linux
Written by

Liangxu Linux

Liangxu, a self‑taught IT professional now working as a Linux development engineer at a Fortune 500 multinational, shares extensive Linux knowledge—fundamentals, applications, tools, plus Git, databases, Raspberry Pi, etc. (Reply “Linux” to receive essential resources.)

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.