Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Great article. I had not heard of sysdig previously.

Based on the timestamps of the entered commands, I guess one of the takeaways for the attacker is to look into config management tools (eg ansible) :)



Since you hadn't heard of sysdig before, you might also be interested in this article posted[1] a couple of weeks ago: http://bencane.com/2014/04/18/using-sysdig-to-troubleshoot-l...

[1]https://news.ycombinator.com/item?id=7622121


I hadn't either and thank you very much for that link!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: