Hacker News new | past | comments | ask | show | jobs | submit login
Ask HN: How the sysadmin can catch some penetrator?
4 points by eimrine 9 months ago | hide | past | favorite | 2 comments
What log files or what systemd log binaries can have the history of attacks such as trying to exploit some service or proof of some happened penetration via known or unknown bug? What intelligence/logging/anomaly-detecting software the serious guys use for the sake of equipping some online computer with a honeypot-class analisys tool?

I want to have safe online activity for some always-on always-online multi-purpose machine with static IP, no router and a lot of ports opened, having some GNU/Linux OS and not always free and open-source running software.




You might look into products/oss like wazuh and clamav


Also rkhunter

Many years ago I was thinking about logs monitoring to detect anomalies and wrote personal utility to achieve this.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: