Steps for Recovering from a UNIX or NT System Compromise

I present this articla as an example of many that are available on the internet describing step by step procedures for recovering a compromised system. Even if analyzing a honeypot is more of what you are after, getting familiar with the steps to recovery can help you create a methodology for analyzing your breeched system.

This article has important links to relevant law enforcement agencies and supplements to the article itself.

CERT�/CC Steps for Recovering from a UNIX or NT System Compromise






<< Home

This page is powered by Blogger. Isn't yours?