In this video, John Strand discusses the essential Linux commands for initial forensic analysis when suspecting a system compromise. He demonstrates how to use Lsof to identify and investigate open files and network connections, providing insights into process IDs and associated resources.
In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.
In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.
If you missed our Anti-Cast, “XFS Forensics with xfs_db,” with Hal Pomeranz, you can view the live recording! Join Hal for his class, “Linux Forensics,” Sept. 12-15, 2023!
Join Hal Pomeranz and the Antisyphon Team this Wednesday at 12 p.m. EDT for our next Anti-Cast, “Forensicating Linux LD_PRELOAD Rootkits”!Tune in at 11:30 a.m. EDT for PreShow Banter™. Register here: https://zoom.us/webinar/register/WN_T43NCXR2Sg2jDmVpxUZXgw Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks …
Join us for an Anti-Cast this Wednesday with the Linux master himself, Hal Pomeranz! Webcast starts at 12 p.m. ET, PreShow Banter™ at 11:30 a.m. ET. Register here: https://lnkd.in/ejj33hVqIf you’ve been using the Linux command line for a long time, you may have missed out on some …