Tagged articles
4 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Apr 29, 2016 · Information Security

How to Analyze and Recover from a Linux Rootkit Intrusion

This article walks through a real-world Linux server compromise, detailing the attack symptoms, forensic analysis steps, rootkit discovery, exploitation of an Awstats script vulnerability, and practical remediation measures to restore and harden the affected system.

AwstatsForensicsLinux
0 likes · 14 min read
How to Analyze and Recover from a Linux Rootkit Intrusion
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery

This article details a real‑world Linux server intrusion, showing how a rootkit exploited an Awstats script vulnerability, the forensic steps to identify malicious processes, hidden files, and compromised accounts, and the recommended remediation actions to restore a secure environment.

AwstatsForensicsLinux
0 likes · 14 min read
Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery