I've Been Hacked-What Now

From OWASP
Revision as of 20:46, 19 November 2008 by Donwalrus (Talk | contribs)

Jump to: navigation, search

This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.

Anyone interested in contributing is welcome.

Here are the current section ideas contributed by marcin

Contents

Identification

Assessment

Containment

Evidence Collection

Forensic Analysis

Investigation

Incident Follow-up