Mailinglist Archive


After an Exploit: mitigation and remediation
From:Joe Klemmer
Date: Wed, 02 Aug 2006 00:14:44 -0400

After an Exploit: mitigation and remediation
By Jamie Riden

This article describes a few hardening and alerting methods for Unix
servers that help block vectors for various attacks, including two
web-based application attacks, DNS issues, and the brute-forcing of SSH
passwords. The article then looks at steps to take and lessons learned
post-compromise.

http://www.securityfocus.com/infocus/1871