Tag

chattr

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Dec 26, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server breach, describing the symptoms, investigative commands, log analysis, malicious script removal, file attribute unlocking, and practical remediation steps, while highlighting key lessons and preventive measures for future security.

Incident ResponseIntrusion DetectionLinux
0 likes · 16 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

LinuxServer Intrusionchattr
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Aug 15, 2023 · Information Security

How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response

This article details a real‑world Linux server intrusion, describing the observed symptoms, the forensic investigation using commands like ps, top, last, and grep, the removal of malicious cron jobs and backdoors, and the lessons learned for securing SSH, file attributes, and cloud security groups.

CronIncident ResponseLinux
0 likes · 15 min read
How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response
Java Captain
Java Captain
Mar 7, 2023 · Information Security

Server Intrusion Investigation and Remediation Steps

This article details a recent server intrusion case, describing the observed symptoms, possible causes, step‑by‑step forensic investigation using commands like ps, top, grep and crontab, and comprehensive remediation actions such as tightening SSH security, unlocking and restoring system binaries, removing malicious scripts, and key lessons for future protection.

Incident ResponseServer Securitychattr
0 likes · 14 min read
Server Intrusion Investigation and Remediation Steps
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

CronIntrusion DetectionLinux
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
Java Captain
Java Captain
Sep 14, 2022 · Information Security

Server Intrusion Investigation and Remediation on a Compromised Linux Host

This article documents a recent Linux server compromise, detailing observed symptoms, investigative commands, discovered malicious scripts, and step‑by‑step remediation actions such as restricting SSH access, unlocking and restoring system utilities, removing malicious cron jobs, and hardening the system against future attacks.

CronIncident ResponseLinux
0 likes · 13 min read
Server Intrusion Investigation and Remediation on a Compromised Linux Host
Efficient Ops
Efficient Ops
Sep 13, 2022 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server compromise, describing the symptoms, possible causes, investigative commands, hidden malicious scripts, file attribute locks, and practical remediation steps to restore the system and improve future security.

CronIncident ResponseIntrusion Detection
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Python Programming Learning Circle
Python Programming Learning Circle
Mar 26, 2021 · Operations

Understanding Linux File Permissions, Ownership, ACL, Sudo and Special Attributes

This article explains Linux file and directory permission types, how to view and modify them with commands such as ls, chmod, chown, chgrp, umask, setfacl, sudo, and chattr, and describes special permission bits like SetUID, SetGID, Sticky Bit and immutable attributes.

ACLFile PermissionsLinux
0 likes · 19 min read
Understanding Linux File Permissions, Ownership, ACL, Sudo and Special Attributes