How to Detect and Recover From Linux Server Intrusions: Essential Checks

This guide walks Linux operations engineers through eleven practical checks—ranging from log inspection and user file verification to process analysis and file recovery—to identify whether a machine has been compromised and how to restore critical files.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
How to Detect and Recover From Linux Server Intrusions: Essential Checks

As open‑source products become more prevalent, Linux operations engineers need clear methods to determine whether a host has been compromised. The following checks were performed on a CentOS 6.9 system and are applicable to other Linux distributions.

1. Verify log integrity

Attackers may delete log files. Check whether logs still exist or have been cleared, using appropriate commands.

2. Inspect /etc/passwd and /etc/shadow

Attackers might create new user accounts. Review these files for unexpected entries.

3. Detect modifications to user files

Check the contents of /etc/passwd and /etc/shadow for unauthorized changes.

4. Review recent successful and failed logins

Examine /var/log/lastlog to see the last successful login and recent failed attempts.

5. List currently logged‑in users

Inspect the /var/run/utmp file for all active sessions.

6. Examine historical login records

Check /var/log/wtmp for users who have logged in since the system was created.

7. Analyze user connection durations

Use /var/log/wtmp to see how long each user has been connected (in hours).

8. Detect abnormal network traffic

If unusual traffic is observed, capture packets with tcpdump or measure bandwidth with iperf.

9. Search the security log

Review /var/log/secure for clues about the attacker’s activity.

10. Identify suspicious processes and their scripts

Use top to find the PID of an abnormal process, then locate its executable in the virtual file system (e.g., /proc/<PID>/fd/).

11. Recover deleted critical files

If important files such as logs have been removed, they may still be open by a running process. Use lsof to find processes holding the deleted file descriptor, then read the file via /proc/<PID>/fd/<FD> and redirect the output to a new file to restore it.

Note: When a process keeps a file open after deletion, the file remains on disk and can be recovered through its file descriptor, even though it is no longer visible in the directory tree.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

intrusion detectionForensics
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.