Checklists: System is Hacked (Part 1) Confirming a Compromise

Introduction

As in my previous blog where I explained how I came to know if my system is hacked or compromised (link here). Here in this blog, I will explain what basic things we can check on our system when we have doubt if our system is compromised.

This blog has 3 parts. In this part, we look at a list of checks which can determine if a system is compromised or hacked.

Linux Machine Compromised: Power of Observation

Introduction

In debugging any issue or any dealing with any problem or circumstance, 2 things are important:

  • Observation — Observation not only at the time of issue but in general times also.
  • Combining your general observations and observations at the time of issue to conclude something.

In this blog, I will explain the following :