Talk With an Expert

Forgetting to Lock the Back Door: A Break-in Analysis on a Red Hat Linux 6.2 Machine

Forgetting to Lock the Back Door: A Break-in Analysis on a Red Hat Linux 6.2 Machine (PDF, 1.68MB)Published: 04 Aug, 2002
Created by:
Gary Belshaw

This document is intended to highlight the steps taken in ascertaining the level of damage done in a network break-in (or hack attack) on our system, and the steps taken in rectifying the damage. Using the crisis case I encountered in a small company, I will demonstrate how to gather the evidence, secure the network, and provide suggestions for amendments to the existing system to minimize the chances of a repeat break in. I will also discuss some of the tools and utilities I used in order to perform this task and give comments to how they should be applied.