[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

An utility or whatever that can monitor/log all the activities in OS of the compromised machine



Good day.

Is there an utility or whatever that can monitor/log all the activities in OS
of the compromised machine to investigate the situation?

And, what is more
important - could You share Your experience on how to illuminate from whence
the criminal got its root privileges?

Is it possible to log net activities through iptables? - I did try LOG target
but w/ no success.

Thank You for Your time.


Reply to: