Bypassing & detecting nonexistant home and nologin
How do attackers gain access to a *nix box by exploit services running as unprivileged users with no home directory and without a shell?
On the host level, is there a way to detect attackers when they are in the limbo phase created by exploiting a service like that?
|