Forensics Hints
Last updated
Last updated
Incident Response Collector on GitHub
Locally those places can contain interesting stuff
/var/spool/cron
for user-specified cron jobs. This could be useful, as there's a lot of stuff scheduled there. Sometimes, these are hiding real gems.
/etc/cron.*
of course too
/etc/hosts
, just in case of any unexpected modifications of DNS resolutions.
/etc/passwd
, /etc/group
in case we suspect some unexpected users or groups present on the system. These are good to acquire anyway, for possible further correlations.
/var/log
folder and the data there, of course.
last
and last -f /var/log/btmp
information
Contains data about interactive logons and failed (interactive) logons.
ps -aux
report, or something similar.
netstat -lntp
or some other form which will list established and listening sockets.
modprobe
and all the loaded modules lsmod
/etc/shadow example
Username : It is your login name.
Password : It is your encrypted password. The password should be minimum 8-12 characters long including special characters, digits, lower case alphabetic and more. Usually password format is set to $id$salt$hashed, The $id is the algorithm used On GNU/Linux as follows:
$1$ is MD5
$2a$ is Blowfish
$2y$ is Blowfish
$5$ is SHA-256
$6$ is SHA-512
Last password change (lastchanged) : Days since Jan 1, 1970 that password was last changed
Minimum : The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password
Maximum : The maximum number of days the password is valid (after that user is forced to change his/her password)
Warn : The number of days before password is to expire that user is warned that his/her password must be changed
Inactive : The number of days after password expires that account is disabled
Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used.
! or * indicate that the user will not be able to use a unix/linux password to log in. In other words user login will be disabled.
There are some artefacts in Event Logs (Windows 2003)
Sometimes it could occur in logs
It is caused by configuration of SSH
When GSSAPIAuthentication is set to no publickey will not be postponed.
List of services with wordlists