Linux Forensics
Linux Forensics
What is Linux?
Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one
of the most popular platforms on the planet, Android, is powered by the Linux
operating system. An operating system is software that manages all of the
hardware resources associated with your desktop or laptop. To put it simply,
the operating system manages the communication between your software
and your hardware. Without the operating system (OS), the software wouldn’t
function.
Popular Linux distributions include:
LINUX MINT
MANJARO
DEBIAN
UBUNTU
ANTERGOS
SOLUS
FEDORA
ELEMENTARY OS
OPENSUSE
And don’t think the server has been left behind. For this arena, you can turn
to:
Ext
Ext2, Ext3, Ext4 are simply different versions of the "native" Linux Ext file
system. This type falls under active developments and improvements.
ReiserFS
An alternative Linux file system optimized for storing a huge number of
small files. It has good search capabilities and enables compact allocation
of files by storing their tails or simply very small items along with
metadata in order to avoid using large FS blocks for this purpose.
However, this format is no longer actively developed and supported.
XFS
XFS file system was considered as high-speed JFS, which is developed for
parallel I/O processing. NASA still using this file system with its high
storage server (300+ Terabyte server).
Btrfs
Btrfs stands for the B tree file system. It is used for fault tolerance,
repair system, fun administration, extensive storage configuration, and
more. It is not a good suit for the production system.
To identify whether there is an account in your system that may seem suspicious:
Users list
UID-0 users
:0: is used to display ‘UID 0’ files in /etc./passwd file:
Temporary users
To Identify and display whether an attacker created any temporary user:
Groups
The group file displays the information of the groups used by the user:
Groups list
Sudoers group
System Configuration
Network configurations
Configuration files for network setup:
OS information
Determines OS release information:
Hostname
Time zone
User Activities
Ps
The command PS is the short notation for “process status”. The command is
used to view the list of processes running in the system. It provides a snapshot
of the current processes along with detailed information of user Id, CPU usage,
memory usage, command name, etc. Investigators can check for the tree to
determine any suspicious processes and dependencies.
Mounted points
To check if there is an unknown mount on your system:
History
Log Analysis
Log files are records of all the activities performed over an operating system.
Linux log files store information about the system’s kernel and the services
running in the system. In Linux OS, different log files hold different
information, which helps the investigators to analyze various issues during a
security incident.
Log entries
Wtmp
BSD operating systems that keeps a history of all logins and logouts.
Persistence Mechanisms
On Linux, just like Windows, malware once loaded wants to stay loaded. On
Windows systems, this is usually done with a variety of registry mechanisms. For
Linux, it’s often done using the crontab scheduling facility or a malicious service
running on the system.
Services
The services in the Linux system can be classified into system and network services.
System services include the status of services, cron, etc and network services
include file transfer, domain name resolution, firewalls, etc.
Processes
To get a dynamic and a real-time visual of all the processes running in the Linux
system, a summary of the information of the system and the list of processes and
their ID numbers or threads managed by Linux Kernel, we will use:
Firewall Rules
To check and manage the IPv4 packet filtering and NAT in Linux systems we will
use:
Network Connections