Linux Compromise Assessment Command Cheat Sheet: The Big Five Directories Users
This document provides a cheat sheet of Linux commands that can be used to assess if a system has been compromised. It lists processes, directories, files, users and logs that should be checked, along with specific commands to find anomalies or signs of intrusion in each of these areas. Some key things to check include open ports and sockets, SUID/SGID files, recently modified files, logs with unusual content, and scheduled tasks. The goal is to help identify unusual or suspicious activity that warrants further investigation.
Linux Compromise Assessment Command Cheat Sheet: The Big Five Directories Users
This document provides a cheat sheet of Linux commands that can be used to assess if a system has been compromised. It lists processes, directories, files, users and logs that should be checked, along with specific commands to find anomalies or signs of intrusion in each of these areas. Some key things to check include open ports and sockets, SUID/SGID files, recently modified files, logs with unusual content, and scheduled tasks. The goal is to help identify unusual or suspicious activity that warrants further investigation.