Difference between revisions of "I've Been Hacked-What Now"

From OWASP
Jump to: navigation, search
Line 4: Line 4:
  
 
Anyone interested in contributing is welcome.
 
Anyone interested in contributing is welcome.
 +
 +
 +
<small>comment added by [[User:Marcin|Marcin]] • 14:24, 19 November 2008 (UTC):</small><br />
 +
Below are some basic bullet points that should be expanded on/revised, etc.
 +
 +
*Identification
 +
*Assessment
 +
*Containment
 +
*Evidence Collection
 +
*Forensic Analysis
 +
*Investigation
 +
*Incident Follow-up

Revision as of 09:26, 19 November 2008

My Server Has Been Hacked--What Do I Do Now??

This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.

Anyone interested in contributing is welcome.


comment added by Marcin • 14:24, 19 November 2008 (UTC):
Below are some basic bullet points that should be expanded on/revised, etc.

  • Identification
  • Assessment
  • Containment
  • Evidence Collection
  • Forensic Analysis
  • Investigation
  • Incident Follow-up