Tagged articles
1 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Jan 12, 2018 · Information Security

How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.

Network Monitoringintrusion detectionkernel integrity
0 likes · 14 min read
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks