Difference between revisions of "I've Been Hacked-What Now"

From OWASP
Jump to: navigation, search
(My Server Has Been Hacked--What Do I Do Now??)
Line 5: Line 5:
 
Anyone interested in contributing is welcome.
 
Anyone interested in contributing is welcome.
  
 +
Here are the current section ideas contributed by marcin
  
<small>comment added by [[User:Marcin|Marcin]] • 14:24, 19 November 2008 (UTC):</small><br />
+
==Identification==
Below are some basic bullet points that should be expanded on/revised, etc.
+
==Assessment==
 
+
==Containment==
*Identification
+
==Evidence Collection==
*Assessment
+
==Forensic Analysis==
*Containment
+
==Investigation==
*Evidence Collection
+
==Incident Follow-up==
*Forensic Analysis
+
*Investigation
+
*Incident Follow-up
+

Revision as of 19:46, 19 November 2008

My Server Has Been Hacked--What Do I Do Now??

This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.

Anyone interested in contributing is welcome.

Here are the current section ideas contributed by marcin

Identification

Assessment

Containment

Evidence Collection

Forensic Analysis

Investigation

Incident Follow-up