Unit 2 2
Unit 2 2
Unix Systems
Topics
•Creating a Response
•Toolkit
•Storing Obtained
•Information
•Obtaining Volatile Data
•Prior to Forensic
•Duplication
•Data to Collect
•Unix File Deletion
•Executing a Trusted
•Shell
•Gathering Info
Introduction
compatible.
Creating a Response Toolkit
Ports
netstat –an
Processes
netstat –anp
Note, average Unix system has many more
processes running than Windows system.
Processes
ps command
Checksums
(LKMs)
Unix kernel is a single program
LKMs are programs that can be dynamically linked into
the kernel after the system has booted up
Rogue LKMs installed by attackers can intercept
/etc/passwd
/etc/shadow
/etc/groups
/etc/hosts
/etc/hosts.equiv
Discovering Illicit Sniffers
A sniffer can increase an attack’s severity.
Also indicates attacker had root privileges
Hackers use sniffer software to capture, decode, and
analyze packets of data sent over a network using
TCP/IP or other protocols.
What is sniffing and spoofing?