Forgetting to Lock the Back Door: A Break-in Analysis on a Red Hat Linux 6.2 Machine

This document is intended to highlight the steps taken in ascertaining the level of damage done in a network break-in (or hack attack) on our system, and the steps taken in rectifying the damage. Using the crisis case I encountered in a small company, I will demonstrate how to gather the evidence,...
Gary Belshaw
August 4, 2002

All papers are copyrighted. No re-posting of papers is permitted