IronShade
Perform a compromise assessment on a Linux host and identify the attack footprints. - by Dex01
Retrieving The Machine ID
Backdoor User Account Created on the Server
Cronjob Set Up by Attacker for Persistence
Suspicious Hidden Process Identified from Backdoor Account
Number of Processes Running from Backdoor Account's Directory
Hidden File in Memory Found in the Root Directory
Suspicious Services Installed on the Server
Backdoor Account Created on the Infected System
Multiple SSH Connections to Backdoor Account Originated from IP Address
Number of Failed SSH Login Attempts on the Backdoor Account
Malicious Package Installed on the Host
Secret Code Found in the Metadata of the Suspicious Package
Last updated
Was this helpful?