Required Reading: After an Exploit: mitigation and remediation
Posted 07-25-2006 at 05:05 AM by unSpawn
Updated 07-08-2011 at 05:49 PM by unSpawn (Changed URI from SecurityFocus:2006 to Symantec:2010)
Updated 07-08-2011 at 05:49 PM by unSpawn (Changed URI from SecurityFocus:2006 to Symantec:2010)
After an Exploit: mitigation and remediation.
"In this article we describe a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks and the brute-forcing of SSH passwords. The article then looks at what an administrator should do post-compromise."
"In this article we describe a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks and the brute-forcing of SSH passwords. The article then looks at what an administrator should do post-compromise."