After an Exploit: mitigation and remediation | |
From: | Joe Klemmer |
Date: | Wed, 02 Aug 2006 00:14:44 -0400 |
After an Exploit: mitigation and remediation By Jamie Riden This article describes a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks, DNS issues, and the brute-forcing of SSH passwords. The article then looks at steps to take and lessons learned post-compromise. http://www.securityfocus.com/infocus/1871