SearchSecurity.com

Cleaning a compromised server: How to detect booter shells, remnants

My enterprise recently suffered a server breach and we're now trying to clean up. I've noticed more traffic than usual coming from the server and have heard about hackers leaving behind tools called "booter shells" after attacks to be used for future DDoS attacks. How can I tell if booter shells are infecting this server? How can I clean them off if they're on the server?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement