How to Detect and Recover From Linux Server Intrusions: A Step‑by‑Step Guide

This article outlines common intrusion signs on CentOS 6.9 systems, explains how to examine logs, user files, login records, network traffic, and demonstrates using lsof and /proc to recover deleted security logs, providing practical commands for Linux security engineers.

Open Source Linux
Open Source Linux
Open Source Linux
How to Detect and Recover From Linux Server Intrusions: A Step‑by‑Step Guide

As open‑source products become increasingly popular, Linux operations engineers must be able to clearly identify whether a compromised machine has been intruded. The author shares several common intrusion scenarios observed on CentOS 6.9 and how to verify them.

1. Attackers may delete the machine's log files

Check whether log information still exists or has been cleared. Example commands:

2. Attackers may create a new file storing usernames and passwords

Inspect /etc/passwd and /etc/shadow files. Example commands:

3. Attackers may modify the username and password files

Examine the contents of /etc/passwd and /etc/shadow to detect changes. Example commands:

4. View recent successful login events and the last unsuccessful login event

Check the /var/log/lastlog file. Example commands:

5. View all users currently logged into the machine

Inspect the /var/run/utmp file. Example commands:

6. View users who have logged in since the machine was created

Check the /var/log/wtmp file. Example commands:

7. View each user's total connection time (hours)

Again examine the /var/log/wtmp file. Example commands:

8. If abnormal traffic is observed

Use tcpdump to capture packets or iperf to assess traffic.

9. Examine the /var/log/secure log file

Attempt to discover attacker information. Example commands:

10. Identify scripts associated with suspicious processes

Use top to find the PID of the suspicious process.

11. Recover deleted important files after confirming intrusion

When a process keeps a deleted file open, the file remains on disk and can be accessed via its file descriptor in /proc. Use lsof to locate open descriptors, then read the file through /proc/<pid>/fd/<fd> and redirect the output to a new file.

Example steps:

Verify that /var/log/secure is missing.

Use lsof to see if any process still has the file open.

Identify the PID (e.g., 1264) and file descriptor (e.g., 4) from the lsof output.

Read the file via /proc/1264/fd/4 and redirect it to a new file.

Confirm that /var/log/secure now exists.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

LinuxSecuritylog analysisintrusion detectionForensics
Open Source Linux
Written by

Open Source Linux

Focused on sharing Linux/Unix content, covering fundamentals, system development, network programming, automation/operations, cloud computing, and related professional knowledge.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.