All Questions
2 questions
0
votes
1
answer
2k
views
How can a hacker compromising the www-data user account install a rootkit?
Recently a site of mine was hacked. For sure the attacker can execute PHP and start an interactive shell, etc.
I understand a hacker can delete files, or delete DB, the site folder, write in the cron ...
3
votes
2
answers
468
views
How can I keep one hacked website on my server from compromising the other websites?
I'm a teaching assistant in software security and running a server that is vulnerable by design.
It's an nginx server, and it has 40 ports open. Each port serves a web application, and all the web ...