Forgetting to Lock the Back Door: A Break-in Analysis on a Red Hat Linux 6.2 Machine
This document is intended to highlight the steps taken in ascertaining the level of damage done in a network break-in (or hack attack) on our system, and the steps taken in rectifying the damage. Using the crisis case I encountered in a small company, I will demonstrate how to gather the evidence,...