Steps for Recovering from a UNIX or NT System Compromise
I present this articla as an example of many that are available on the internet describing step by step procedures for recovering a compromised system. Even if analyzing a honeypot is more of what you are after, getting familiar with the steps to recovery can help you create a methodology for analyzing your breeched system.
This article has important links to relevant law enforcement agencies and supplements to the article itself.
CERT�/CC Steps for Recovering from a UNIX or NT System Compromise
This article has important links to relevant law enforcement agencies and supplements to the article itself.
CERT�/CC Steps for Recovering from a UNIX or NT System Compromise