Difference between revisions of "I've Been Hacked-What Now"
From OWASP
| Line 4: | Line 4: | ||
Anyone interested in contributing is welcome. | Anyone interested in contributing is welcome. | ||
| + | |||
| + | |||
| + | <small>comment added by [[User:Marcin|Marcin]] • 14:24, 19 November 2008 (UTC):</small><br /> | ||
| + | Below are some basic bullet points that should be expanded on/revised, etc. | ||
| + | |||
| + | *Identification | ||
| + | *Assessment | ||
| + | *Containment | ||
| + | *Evidence Collection | ||
| + | *Forensic Analysis | ||
| + | *Investigation | ||
| + | *Incident Follow-up | ||
Revision as of 14:26, 19 November 2008
My Server Has Been Hacked--What Do I Do Now??
This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.
Anyone interested in contributing is welcome.
comment added by Marcin • 14:24, 19 November 2008 (UTC):
Below are some basic bullet points that should be expanded on/revised, etc.
- Identification
- Assessment
- Containment
- Evidence Collection
- Forensic Analysis
- Investigation
- Incident Follow-up