First steps to regain control on a compromised infrastructure