Mailinglist Archive
| After an Exploit: mitigation and remediation
|
| From: | Joe Klemmer |
| Date: | Wed, 02 Aug 2006 00:14:44 -0400
|
After an Exploit: mitigation and remediation
By Jamie Riden
This article describes a few hardening and alerting methods for Unix
servers that help block vectors for various attacks, including two
web-based application attacks, DNS issues, and the brute-forcing of SSH
passwords. The article then looks at steps to take and lessons learned
post-compromise.
http://www.securityfocus.com/infocus/1871