Hello, I've received an attack on my server on ssh port, apparently using cron by remote. The intruder is successfully entered in my system as Super-user, (this server is empty, just for pen-testing) and reset my .authlog and changed privileges on .secure to read. I've noticed it thanks to multitail program that was running a real time scanning of both files
. Is this reasonably possible? How? I was using ssh 2.0.
Thanks

Thanks