Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
0 votes
1 answer
2k views

How can a hacker compromising the www-data user account install a rootkit?

Recently a site of mine was hacked. For sure the attacker can execute PHP and start an interactive shell, etc. I understand a hacker can delete files, or delete DB, the site folder, write in the cron ...
Beto Aveiga's user avatar
3 votes
2 answers
468 views

How can I keep one hacked website on my server from compromising the other websites?

I'm a teaching assistant in software security and running a server that is vulnerable by design. It's an nginx server, and it has 40 ports open. Each port serves a web application, and all the web ...
Magnus's user avatar
  • 255