1/ Linux #Hardening and #ThreatHunting
The screenshot below is from Microsoft [1] - using XorDdos as an example, we can learn a lot about Linux forensics and hardening. 🧵
#CyberSecurity
10
153
5
480
Not sufficient. “UsePAM yes” effectively overrides “PasswordAuthentication no” and “UsePAM no” is a bad idea. You need to disable password auth in your PAM stack too.
Aug 9, 2022 · 3:59 PM UTC
2


