As per the title, where would hackers normally attack or gain entry to a Linux box?
Also, what sort of things will they change once inside the system: create users, install kits, drop a shell?
Not new to Linux but always good to know what things to look for in an intrusion and/or be vigilant about certain odd system behaviors/processes.
[link] [comments]
from hacking: security in practice https://ift.tt/3su5u8q
Comments
Post a Comment