This document serves as a cheat sheet for system administrators to detect potential security breaches in Linux systems. It outlines various commands and tools for identifying unusual accounts, processes, files, and network activities that may indicate a compromise. The guide emphasizes the significance of periodic checks and reporting any anomalies to an incident handling team.