{"id":2278,"date":"2012-05-10T14:58:18","date_gmt":"2012-05-10T14:58:18","guid":{"rendered":"http:\/\/www.theperfectarts.com\/?p=2278"},"modified":"2018-01-06T16:37:35","modified_gmt":"2018-01-06T16:37:35","slug":"partition-targeted-by-hackers-to-hack-linux-server","status":"publish","type":"post","link":"https:\/\/www.ktchost.com\/blog\/partition-targeted-by-hackers-to-hack-linux-server\/","title":{"rendered":"Partition targeted by hackers to hack Linux Server"},"content":{"rendered":"<p>Basically hackers uploading the hacking script under the server insecure partition, so that hacking script easily executed server side and user can&#8217;t understand where hacking script is actually.To secure the server make sure that partition not having execution permission.Once in every week monitor the following partition and remove the files which is seems to be hacking file.<\/p>\n<p><strong>\/tmp<br \/>\n\/dev\/shm<br \/>\n\/usr\/local\/apache\/proxy<br \/>\n\/usr\/local\/flash<!-- Place this tag where you want the +1 button to render --><br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/www.ktchost.com\/wordpress-hosting.html\"><img loading=\"lazy\" decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2016\/09\/footer-2.png\" alt=\"\" border=\"0\" width=\"468\" height=\"60\"  \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Basically hackers uploading the hacking script under the server insecure partition, so that hacking script easily executed server side and user can&#8217;t understand where hacking <a class=\"mh-excerpt-more\" href=\"https:\/\/www.ktchost.com\/blog\/partition-targeted-by-hackers-to-hack-linux-server\/\" title=\"Partition targeted by hackers to hack Linux Server\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39,43,42],"tags":[],"class_list":["post-2278","post","type-post","status-publish","format-standard","hentry","category-centos-server","category-commands","category-security"],"_links":{"self":[{"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/posts\/2278"}],"collection":[{"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/comments?post=2278"}],"version-history":[{"count":7,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions"}],"predecessor-version":[{"id":6168,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions\/6168"}],"wp:attachment":[{"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/media?parent=2278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/categories?post=2278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ktchost.com\/blog\/wp-json\/wp\/v2\/tags?post=2278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}