A Linux Intrusion Investigation

A Linux Intrusion Investigation

According to the received threat intelligence report, the hacker group IronShade has launched attacks against Linux servers in the region. To prevent attacks from this APT organization and understand their attack patterns, our team set up a honeypot, exposing weak SSH and ports. As security analysts, we need to conduct a comprehensive intrusion assessment on … Read more

Emergency Response: Linux Intrusion Investigation Strategies

Emergency Response: Linux Intrusion Investigation Strategies

0x00 Introduction When a company experiences a hacker intrusion, system crash, or other security incidents that affect normal business operations, it is crucial to respond immediately to restore the company’s network information system to normal operation in the shortest time possible. Furthermore, it is necessary to investigate the source of the intrusion, reconstruct the incident … Read more