[ bunten.de ]
This is the homepage of Andreas Bunten. I am interested in IT security and work in that field for more than 10 years. My work experience can be looked up at the usual places (Xing, Linked-In). Within the field of IT security I specialise on reactive security and techniques of the attackers:
- SSH Attacks: One way to gain access to a system is to connect by SSH protocol and try to guess the password. We call that Account Brute Force or simply SSH Attack.
- Emergency Response: How do I react to a security incident? My server being compromised by an SSH Attack is one example of a security incident.
- Rootkits: When the attacker once had access to my system, they might have installed a rootkit to disguise their presence and stay under the radar of the system administrators.
- Backdoors: Attackers usually want to access the compromised system again at a later time. An easy way to do that is by using a backdoor which the attackers brought onto your system. This way they do not have to exploit the same security vulnerability again to gain access.
By this domain you can reach other family members with the same name. If your family name is Bunten and you would like a mail forward, just drop me a line.