Get Help Now
    24/7 Support

    Linux Machine – Intrusion Discovery

    Balaji N is an analyst for information security at COMODO Security Inc, as well as a security researcher. Not long ago, Balaji discussed in his article “Penetration into Spyware” for Windows Machine – Intrusion Detection. Now he focuses our attention on a Penetration Testing Checklist For Linux Machine – Intrusion Discovery.

     


    Linux Checklist:
    • Unusual Accounts;
    • Unusual Log Entrie;
    • Unusual processes and services;
    • Unusual files;
    • Unusual network usage;
    • Unusual Assigned Tasks;
    • Other Fancy goods.
    Balaji stopped at each point of the list.

     

    More.



    DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.