Tagged articles
39 articles
Page 1 of 1
Ops Community
Ops Community
May 4, 2026 · Information Security

Investigating and Securing a Server After a Suspicious Login

When a production server shows unexpected high CPU usage and unknown login activity, this guide walks Linux ops engineers through confirming intrusion, stopping the attacker, tracing the attack path, removing backdoors, restoring system integrity, and applying hardening measures to prevent future breaches.

ForensicsHardeningLinux
0 likes · 27 min read
Investigating and Securing a Server After a Suspicious Login
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2026 · Information Security

Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide

This comprehensive guide walks you through building a layered Linux intrusion detection system, configuring host‑based tools such as AIDE, rkhunter, and auditd, automating security audits, performing forensic investigations, and executing a six‑step incident response workflow to detect, contain, and remediate attacks effectively.

AIDEAuditdForensics
0 likes · 59 min read
Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide
Black & White Path
Black & White Path
Feb 11, 2026 · Information Security

Linux Intrusion Checklist: Detect Hacker Activity with a Single Script

The article introduces Linux_checklist.sh, a script that audits a Linux system for signs of compromise—including network sniffing, deleted‑file processes, tampered binaries, unauthorized SSH keys, malicious cron jobs, resource abuse, privilege anomalies, persistence mechanisms, file integrity issues, and suspicious log activity—while warning that its output contains sensitive data.

ForensicsLinuxSysadmin
0 likes · 6 min read
Linux Intrusion Checklist: Detect Hacker Activity with a Single Script
Efficient Ops
Efficient Ops
Dec 14, 2025 · Information Security

Detect and Respond to Linux Server Intrusions with Log Analysis

This guide walks you through using Linux log tools such as last, lastb, grep, and sshd_config to identify suspicious logins, trace malicious IPs, and apply immediate remediation steps for compromised servers, targeting ops engineers and developers.

ForensicsLinuxSSH
0 likes · 8 min read
Detect and Respond to Linux Server Intrusions with Log Analysis
Open Source Linux
Open Source Linux
Oct 9, 2025 · Information Security

Essential Incident Response & Forensics Guide for Server Intrusions

This article provides a comprehensive step‑by‑step process for detecting server compromises, collecting system, memory, and network evidence, analyzing logs, isolating the affected host, removing malicious artifacts, and hardening the environment to prevent future attacks.

ForensicsServer Securityincident response
0 likes · 15 min read
Essential Incident Response & Forensics Guide for Server Intrusions
Liangxu Linux
Liangxu Linux
Oct 8, 2025 · Information Security

How to Detect and Respond to Server Intrusions: A Complete 24‑Hour Playbook

This guide walks operations engineers through recognizing intrusion signals, executing a step‑by‑step 24‑hour emergency response, performing digital forensics, cleaning the system, hardening security settings, and establishing continuous monitoring to prevent future attacks.

Forensicsautomationsecurity
0 likes · 15 min read
How to Detect and Respond to Server Intrusions: A Complete 24‑Hour Playbook
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Cron JobsForensicsLD_PRELOAD
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Mar 21, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide

This article walks through a real‑world Linux server breach, detailing the observed symptoms, investigative commands, hidden malicious scripts, file‑locking tricks, and a comprehensive remediation process that includes tightening security groups, strengthening passwords, monitoring critical files, and restoring compromised system utilities.

ForensicsLD_PRELOADLinux
0 likes · 14 min read
How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide
Liangxu Linux
Liangxu Linux
Apr 2, 2023 · Information Security

How to Use Shell Scripts to Manipulate Linux File Timestamps and Hide Traces

This guide explains how attackers can use Linux shell commands such as touch, stat, and ls, combined with custom Bash scripts, to record, modify, and restore file timestamps, enabling them to conceal evidence of intrusion and automate timestamp manipulation on compromised servers.

BashForensicstimestamp
0 likes · 8 min read
How to Use Shell Scripts to Manipulate Linux File Timestamps and Hide Traces
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Dec 2, 2022 · Information Security

How to Detect, Contain, and Eradicate the DarkKomet RAT: A Full Incident Response Walkthrough

This article provides a step‑by‑step technical analysis of the DarkKomet remote‑access trojan, covering its capabilities, infection vectors, detection methods using TTP‑driven EDR, containment actions, eradication procedures, root‑cause forensics, and post‑incident recovery measures.

DarkKometEDRForensics
0 likes · 9 min read
How to Detect, Contain, and Eradicate the DarkKomet RAT: A Full Incident Response Walkthrough
Liangxu Linux
Liangxu Linux
Aug 17, 2022 · Information Security

How to Hide Linux File Timestamps with a Bash Script

This guide explains how attackers can conceal their activities on a Linux system by manipulating file timestamps using the touch, stat, and ls commands and by automating the process with a Bash script that saves, restores, and reapplies timestamps to hide evidence of compromise.

Forensicsscripttimestamp
0 likes · 8 min read
How to Hide Linux File Timestamps with a Bash Script
Open Source Linux
Open Source Linux
Jan 17, 2022 · Information Security

Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals

This comprehensive guide walks security engineers through every phase of an incident response—from initial information gathering, containment, and vulnerability scanning to detailed log, process, and account analysis, culminating in recovery steps and post‑incident hardening recommendations.

ForensicsSecurity OperationsSystem Hardening
0 likes · 28 min read
Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals
Liangxu Linux
Liangxu Linux
Aug 29, 2021 · Information Security

Automating Linux File Timestamp Manipulation to Hide Traces

This guide explains how to use standard Linux utilities and a custom Bash script to view, modify, save, and restore file timestamps, enabling attackers or administrators to conceal or recover evidence of file changes on a server.

ForensicsLinuxTimestamps
0 likes · 10 min read
Automating Linux File Timestamp Manipulation to Hide Traces
Liangxu Linux
Liangxu Linux
Apr 21, 2021 · Information Security

Essential Linux Incident‑Response Commands for Quick Threat Detection

This guide walks through common Linux emergency scenarios—such as mining malware, ransomware, and backdoors—detailing a step‑by‑step workflow and providing essential command‑line tools for process, user, network, and file investigation on CentOS 6 and Windows Server 2008 systems.

ForensicsLinuxincident response
0 likes · 11 min read
Essential Linux Incident‑Response Commands for Quick Threat Detection
ITPUB
ITPUB
Aug 19, 2019 · Information Security

Investigating an SSH Brute‑Force Compromise and Hidden Mining Malware on a Linux Server

A client reported unexpected outbound attack traffic from a server, prompting a step‑by‑step forensic investigation that confirms an SSH brute‑force breach, analyzes logs, identifies malicious network connections and cron jobs, uncovers hidden mining malware, and provides hardening recommendations to secure the Linux host.

ForensicsLinuxSSH brute force
0 likes · 5 min read
Investigating an SSH Brute‑Force Compromise and Hidden Mining Malware on a Linux Server
Liangxu Linux
Liangxu Linux
Aug 5, 2019 · Information Security

Top 12 Linux Distributions for Penetration Testing and Security Research

This guide presents a curated list of twelve Linux distributions—such as Kali Linux, BackBox, Parrot Security OS, and others—detailing their origins, key security tools, desktop environments, installation options, and unique features that make them ideal for ethical hacking, forensics, and network security assessments.

ForensicsInfoSecpenetration testing
0 likes · 8 min read
Top 12 Linux Distributions for Penetration Testing and Security Research
MaGe Linux Operations
MaGe Linux Operations
Nov 15, 2018 · Information Security

Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics

A comprehensive, curated list of 123 Python-based security tools spans network analysis, debugging, reverse engineering, fuzzing, web testing, forensics, malware analysis, PDF inspection, miscellaneous utilities, plus recommended libraries, books, and learning resources for penetration testers and security researchers.

Forensicsfuzzingpenetration testing
0 likes · 16 min read
Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2017 · Information Security

123 Essential Python Tools for Penetration Testing and Security Research

This article compiles a comprehensive list of 123 Python-based penetration testing tools, covering network utilities, debugging and reverse‑engineering frameworks, fuzzing platforms, web testing kits, forensic analysis utilities, malware analysis helpers, PDF inspection modules, miscellaneous libraries, recommended books, talks, and additional resources for security professionals.

ForensicsPythonfuzzing
0 likes · 17 min read
123 Essential Python Tools for Penetration Testing and Security Research
dbaplus Community
dbaplus Community
Jan 25, 2017 · Information Security

Effective Server Security Incident Response: Step‑by‑Step Guide

When a production server is compromised, abrupt actions like pulling the plug can disrupt services, so this guide outlines an eight‑stage, evidence‑driven response process—including verification, on‑site preservation, containment, impact assessment, online analysis, backup, deep forensics, and reporting—plus real‑world case studies and concrete command examples.

ForensicsLinuxServer Security
0 likes · 14 min read
Effective Server Security Incident Response: Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Jan 5, 2017 · Information Security

How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response

After a sudden traffic surge and loss of SSH access on an Ubuntu 12.04 server, I worked with the data‑center team to trace malicious outbound connections, identify compromised binaries, remove persistent backdoor scripts, and implement firewall rules and logging practices to prevent future intrusions.

Forensicsiptablesmalware
0 likes · 8 min read
How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response
Big Data and Microservices
Big Data and Microservices
May 5, 2016 · Information Security

Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise

This guide walks you through eleven systematic Linux security checks—including account inspection, log review, process analysis, file integrity, RPM verification, network monitoring, scheduled tasks, backdoor detection, kernel modules, services, and rootkit scans—to help identify potential system compromises.

ForensicsLinuxRootkit
0 likes · 6 min read
Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise
MaGe Linux Operations
MaGe Linux Operations
Apr 29, 2016 · Information Security

How to Analyze and Recover from a Linux Rootkit Intrusion

This article walks through a real-world Linux server compromise, detailing the attack symptoms, forensic analysis steps, rootkit discovery, exploitation of an Awstats script vulnerability, and practical remediation measures to restore and harden the affected system.

AwstatsForensicsLinux
0 likes · 14 min read
How to Analyze and Recover from a Linux Rootkit Intrusion
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2014 · Information Security

Essential Linux Commands for Incident Response and System Forensics

This guide presents a comprehensive set of Linux commands and practical steps for detecting, analyzing, and responding to compromised systems, covering process identification, file inspection, network checks, log recovery, forensic imaging, and useful tools such as ldd, strace, and nc.

ForensicsLinuxSystem Administration
0 likes · 13 min read
Essential Linux Commands for Incident Response and System Forensics
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery

This article details a real‑world Linux server intrusion, showing how a rootkit exploited an Awstats script vulnerability, the forensic steps to identify malicious processes, hidden files, and compromised accounts, and the recommended remediation actions to restore a secure environment.

AwstatsForensicsLinux
0 likes · 14 min read
Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery