Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

Faruk
articles - 81 total

The First 24 Hours After a Linux Breach — My Incident Response Playbook | by Faruk Ahmed | nextgenthreat | Aug, 2025

Member-only story The First 24 Hours After a Linux Breach — My Incident Response...

Learn More 1 0Aug 18

Why I Never Trust Default Linux User Accounts (And Neither Should You) | by Faruk Ahmed | Aug, 2025 | AWS in Plain English

Member-only story Why I Never Trust Default Linux User Accounts (And Neither Should...

Learn More 1 0Aug 18

Why I Use Read-Only Partitions on My Linux Servers (And You Should Too) | by Faruk Ahmed | Aug, 2025

Member-only story Why I Use Read-Only Partitions on My Linux Servers (And You Should...

Learn More 1 0Aug 18

The Hidden Risks of SSH Agent Forwarding (And How I Avoid Them) | by Faruk Ahmed | Aug, 2025

Member-only story The Hidden Risks of SSH Agent Forwarding (And How I Avoid...

Learn More 1 0Aug 18

Why I Run Multiple SSH Keys Instead of Just One | by Faruk Ahmed | Aug, 2025

Member-only story Why I Run Multiple SSH Keys Instead of Just One -- Share For many...

Learn More 1 0Aug 13

What I Do the Moment I Suspect My Ubuntu Server Has Been Compromised | by Faruk Ahmed | Aug, 2025

Member-only story What I Do the Moment I Suspect My Ubuntu Server Has Been...

Learn More 1 0Aug 13

The One Linux Security Habit That Exposes You — And How I Fixed It | by Faruk Ahmed | Aug, 2025

Member-only story The One Linux Security Habit That Exposes You — And How I Fixed...

Learn More 1 0Aug 13

Immutable Infrastructure on Linux: Why I Don’t Modify Servers After Deployment | by Faruk Ahmed | Aug, 2025

Member-only story Immutable Infrastructure on Linux: Why I Don’t Modify Servers After...

Learn More 1 0Aug 13

How I Hunt for Silent Rootkits on Linux (Before They Hunt Me) | by Faruk Ahmed | Aug, 2025

Member-only story How I Hunt for Silent Rootkits on Linux (Before They Hunt...

Learn More 1 0Aug 13

Why I No Longer Trust “Secure by Default” in Linux Server Installs | by Faruk Ahmed | Jul, 2025

Member-only story Why I No Longer Trust “Secure by Default” in Linux Server...

Learn More 1 0Aug 1

Why You Should Never Trust Default Configurations on a Fresh Linux Install | by Faruk Ahmed | Jul, 2025

Member-only story Why You Should Never Trust Default Configurations on a Fresh Linux...

Learn More 0 0Jul 29

The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

Member-only story The Ultimate Fusion: Linux, Ubuntu, and...

Learn More 1 0Jul 29

The Linux Service That Almost Let Attackers Slip In (And How I Found It Just in Time) | by Faruk Ahmed | Jun, 2025

Member-only story The Linux Service That Almost Let Attackers Slip In (And How I Found It...

Learn More 0 0Jul 29

How I Use aide to Detect Unauthorized Changes on My Linux and Ubuntu Servers | by Faruk Ahmed | Jul, 2025

Member-only story How I Use aide to Detect Unauthorized Changes on My Linux and Ubuntu...

Learn More 0 0Jul 29

How I Harden My Linux Server in 30 Minutes After Every Fresh Install (Ubuntu & Red Hat) | by Faruk Ahmed | Jul, 2025

Member-only story How I Harden My Linux Server in 30 Minutes After Every Fresh Install...

Learn More 0 0Jul 29

How I Found a Hidden Reverse Shell Running as www-data (And What I Did About It) | by Faruk Ahmed | Jul, 2025

Member-only story How I Found a Hidden Reverse Shell Running as www-data (And What I Did...

Learn More 0 0Jul 29

How I Found a Hidden Backdoor User Account on My Ubuntu Server (And What I Did About It) | by Faruk Ahmed | Jun, 2025

Member-only story How I Found a Hidden Backdoor User Account on My Ubuntu Server (And What...

Learn More 0 0Jul 29

7 Things I Check Immediately After Logging Into a Linux Server I Didn’t Set Up | by Faruk Ahmed | Jul, 2025

Member-only story 7 Things I Check Immediately After Logging Into a Linux Server I Didn’t...

Learn More 0 0Jul 29

7 Hidden Backdoors I’ve Found on Compromised Linux Servers (And How to Remove Them) | by Faruk Ahmed | Jul, 2025

Member-only story 7 Hidden Backdoors I’ve Found on Compromised Linux Servers (And How to...

Learn More 0 0Jul 29

Why I Set Email Alerts for Every New User Added to My Linux Server (And How You Can Too) | by Faruk Ahmed | Jul, 2025

Member-only story Why I Set Email Alerts for Every New User Added to My Linux Server (And...

Learn More 0 0Jul 8

Why I Always Check /etc/sudoers.d on a Compromised Linux Server | by Faruk Ahmed | Jun, 2025

Member-only story Why I Always Check /etc/sudoers.d on a Compromised Linux...

Learn More 0 0Jul 8

What I Check Every Week to Keep My Linux Servers Safe and Stable | by Faruk Ahmed | Jul, 2025

Member-only story What I Check Every Week to Keep My Linux Servers Safe and...

Learn More 0 0Jul 8

The Linux Rootkit That Hid in Plain Sight: How I Finally Detected It | by Faruk Ahmed | Jun, 2025

Member-only story The Linux Rootkit That Hid in Plain Sight: How I Finally Detected...

Learn More 0 0Jul 8

How I Use netstat and ss to Catch Suspicious Connections on Linux | by Faruk Ahmed | Jul, 2025

Member-only story How I Use netstat and ss to Catch Suspicious Connections on...

Learn More 0 0Jul 8

How a Controlled Breach Test Helped Me Harden My Linux Server Instantly | by Faruk Ahmed | Jun, 2025

Member-only story How a Controlled Breach Test Helped Me Harden My Linux Server...

Learn More 0 0Jul 8

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Member-only story Why I Never Trust Pre-Installed Packages on Linux or Ubuntu...

Learn More 0 1Jun 17

Why I Check for Hidden Processes Every Week on My Linux Servers (And You Should Too) | by Faruk Ahmed | Jun, 2025

Member-only story Why I Check for Hidden Processes Every Week on My Linux Servers (And You...

Learn More 0 0Jun 13

How I Found an Unknown Cron Job Mining Crypto on My Ubuntu Server | by Faruk Ahmed | Jun, 2025

How I Found an Unknown Cron Job Mining Crypto on My Ubuntu...

Learn More 0 0Jun 13

7 CIS Security Best Practices I Apply on Every Linux Server I Set Up | by Faruk Ahmed | Jun, 2025

Member-only story 7 CIS Security Best Practices I Apply on Every Linux Server I Set...

Learn More 0 0Jun 13

How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

Member-only story How I Use auditd to Catch Hidden Changes on My Linux...

Learn More 0 2Jun 8