LinuxSystemes d'exploitation

Hackers Beware: 10 Steps to Uncover Hackers on Your Linux System!

The main goal of a hacker is to breach into computer and servers and take sensitive information from the system. Most hackers take precautions while engaging in hacking operations and constantly strive to avoid getting detected.

After the system has been infiltrated, the hacker will always install a backdoor to continue access. Today I will show you how to check whether or not your linux machine, computer or server, has been hacked.

Every hacker leaves some evidence; it is up to the you to discover the evidences left behind.

If your machine or server is hacked, it will undoubtedly act in some way at some point. There are a few basic tests we can conduct on our linux computer to determine whether or not the linux system has been hacked.

To fast audit your Linux system, follow this step-by-step tutorial. I hope this helps!

#### CHAPTERS ####
00:16 – Unknown Users
00:54 – Suspicious IPs
03:17 – Connection History
04:34 – Created Users
04:39 – User History
05:54 – Listen for Connections
06:58 – Check Programs
08:55 – Check File Opens
08:58 – Check Processes
09:37 – Check for Root-kits

##### Links: ####

https://www.tiktok.com/@danduran.me
https://www.instagram.com/danduran.me/
https://www.linkedin.com/in/danduran-ca/
https://www.facebook.com/danduran.me

https://GetCyber.me

#HackedLinux #CyberSecurity #BeginnerTutorial

Views : 287
linux

Source by Get Cyber

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *