1. Investigating Linux Devices

    • Buy now
    • Learn more
  2. Welcome and Introduction

    • Welcome and Introduction
  3. Initial Setup

    • Initial Setup
  4. Introduction to Linux

    • History
    • Distros
    • Windows Subsystem for Linux (WSL)
    • Appliances
    • Root Directory Structure
    • File and Directory Permissions
    • Users and Groups
    • Shells and Command History
  5. Linux Logs

    • Authentication and Security
    • Syslog and Kernel
    • Web Services
    • Firewalls and Proxies
    • auditd
    • Sysmon for Linux
    • VMware ESXi and vCenter
    • Miscellaneous
  6. Linux File Systems

    • ext2
    • ext3
    • ext4
    • File System Analysis
    • Timestomping
    • Btrfs
    • XFS
    • OpenZFS
  7. Persistence Mechanisms

    • init.d and systemd Services
    • systemd Timers and Cron Jobs
    • SSH Keys
    • Additional Techniques
  8. Evidence Collection

    • dd, dcfldd, and dc3dd
    • Acquire Volatile Memory for Linux (AVML)
    • Unix-like Artifacts Collector (UAC)
    • Virtualized Environments
  9. Timelining

    • The Sleuth Kit (TSK) fls and mactime
    • Plaso/Log2Timeline
  10. Linux Memory Forensics

    • Installing and Configuring Volatility 3
    • Process Enumeration
    • Command History
    • Network Activity
    • Code Injection
    • Dumping Memory
    • Other Useful Plugins
  11. Live Response

    • The Scenario
    • Walkthrough with UAC
  12. Analyzing a Compromised System

    • The Scenario
    • Evidence Preparation
    • Disk Image Analysis
    • Memory Image Analysis
  13. Additional Content

    • Chaos at Cobalt
  14. Knowledge Assessment

    • Knowledge Assessment
  1. Products
  2. Course
  3. Section

Analyzing a Compromised System

  1. Investigating Linux Devices

    • Buy now
    • Learn more
  2. Welcome and Introduction

    • Welcome and Introduction
  3. Initial Setup

    • Initial Setup
  4. Introduction to Linux

    • History
    • Distros
    • Windows Subsystem for Linux (WSL)
    • Appliances
    • Root Directory Structure
    • File and Directory Permissions
    • Users and Groups
    • Shells and Command History
  5. Linux Logs

    • Authentication and Security
    • Syslog and Kernel
    • Web Services
    • Firewalls and Proxies
    • auditd
    • Sysmon for Linux
    • VMware ESXi and vCenter
    • Miscellaneous
  6. Linux File Systems

    • ext2
    • ext3
    • ext4
    • File System Analysis
    • Timestomping
    • Btrfs
    • XFS
    • OpenZFS
  7. Persistence Mechanisms

    • init.d and systemd Services
    • systemd Timers and Cron Jobs
    • SSH Keys
    • Additional Techniques
  8. Evidence Collection

    • dd, dcfldd, and dc3dd
    • Acquire Volatile Memory for Linux (AVML)
    • Unix-like Artifacts Collector (UAC)
    • Virtualized Environments
  9. Timelining

    • The Sleuth Kit (TSK) fls and mactime
    • Plaso/Log2Timeline
  10. Linux Memory Forensics

    • Installing and Configuring Volatility 3
    • Process Enumeration
    • Command History
    • Network Activity
    • Code Injection
    • Dumping Memory
    • Other Useful Plugins
  11. Live Response

    • The Scenario
    • Walkthrough with UAC
  12. Analyzing a Compromised System

    • The Scenario
    • Evidence Preparation
    • Disk Image Analysis
    • Memory Image Analysis
  13. Additional Content

    • Chaos at Cobalt
  14. Knowledge Assessment

    • Knowledge Assessment

4 Lessons
    • The Scenario
    • Evidence Preparation
    • Disk Image Analysis
    • Memory Image Analysis