compromise
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
compromise [2018/10/12 12:56] – created luke7858 | compromise [2024/05/23 07:26] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 4: | Line 4: | ||
\\ | \\ | ||
The best thing to do is give you an example: | The best thing to do is give you an example: | ||
+ | <sxh bash> # cat / | ||
< | < | ||
- | # cat / | ||
# | # | ||
Line 24: | Line 24: | ||
\\ | \\ | ||
\\ | \\ | ||
- | You can check the PID of the process and it's exe location to find out if it's suspicious or not. This " | + | You can check the PID of the process and it's exe location to find out if it's suspicious or not. This " |
<sxh bash> | <sxh bash> | ||
[root@lll-new ~]# ll / | [root@lll-new ~]# ll / |
compromise.1539348964.txt.gz · Last modified: 2024/05/23 07:26 (external edit)