How to analyze a potentially compromised Linux host machine?
1. Look for suspicious processes Processes that are named to look like the common or legit process, unusual outbound connections, deleted...
Hi, I am Nitya Garg. I am a Security Engineer by profession. I write this blog to share my thoughts, learnings, and experiences on Infosec and life in general.