So... about a Linux system.

As per the title, where would hackers normally attack or gain entry to a Linux box?

Also, what sort of things will they change once inside the system: create users, install kits, drop a shell?

Not new to Linux but always good to know what things to look for in an intrusion and/or be vigilant about certain odd system behaviors/processes.

submitted by /u/Xu_Lin
[link] [comments]

from hacking: security in practice https://ift.tt/3su5u8q

Comments