compromise
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| compromise [2018/10/12 12:56] – created luke7858 | compromise [2024/05/23 07:26] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| \\ | \\ | ||
| The best thing to do is give you an example: | The best thing to do is give you an example: | ||
| + | <sxh bash> # cat / | ||
| < | < | ||
| - | # cat / | ||
| # | # | ||
| Line 24: | Line 24: | ||
| \\ | \\ | ||
| \\ | \\ | ||
| - | You can check the PID of the process and it's exe location to find out if it's suspicious or not. This " | + | You can check the PID of the process and it's exe location to find out if it's suspicious or not. This " |
| <sxh bash> | <sxh bash> | ||
| [root@lll-new ~]# ll / | [root@lll-new ~]# ll / | ||
compromise.1539348964.txt.gz · Last modified: 2024/05/23 07:26 (external edit)
