Jump to content

Recommended Posts

Five of my websites were defaced today and I have no idea how they were compromised. My raw access log files were not very revealing. Are there any other logs that would help me determine what was exploited?

Link to post
Share on other sites
  • 10 months later...

Well as you know applications can log the system activity in two ways, one being according to their autonomous logic & the other through the system's log daemon. The beginning of time, cPanel has logs that it simply does not rotate properly. You have to done settings for it. And still you are not able to do it than you have to show it to ant software engineers.

Edited by Joneswilliamsc
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...