This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "I've Been Hacked-What Now"

From OWASP
Jump to: navigation, search
(My Server Has Been Hacked--What Do I Do Now??)
Line 5: Line 5:
 
Anyone interested in contributing is welcome.
 
Anyone interested in contributing is welcome.
  
 +
Here are the current section ideas contributed by marcin
  
<small>comment added by [[User:Marcin|Marcin]] • 14:24, 19 November 2008 (UTC):</small><br />
+
==Identification==
Below are some basic bullet points that should be expanded on/revised, etc.
+
==Assessment==
 
+
==Containment==
*Identification
+
==Evidence Collection==
*Assessment
+
==Forensic Analysis==
*Containment
+
==Investigation==
*Evidence Collection
+
==Incident Follow-up==
*Forensic Analysis
 
*Investigation
 
*Incident Follow-up
 

Revision as of 01:46, 20 November 2008

My Server Has Been Hacked--What Do I Do Now??

This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.

Anyone interested in contributing is welcome.

Here are the current section ideas contributed by marcin

Identification

Assessment

Containment

Evidence Collection

Forensic Analysis

Investigation

Incident Follow-up