Linux Forensics: Hal Pomeranz
Linux Forensics: Hal Pomeranz
Hal Pomeranz
WHO IS HAL POMERANZ?
Started as a Unix Sys Admin in the 1980s
Independent consultant since 1997
Digital forensics, incident response, expert witness
Have done some interesting Linux/Unix investigations
[email protected]
@hal_pomeranz
https://archive.org/details/HalLinuxForensics
https://wildwesthackinfest.com/deadwood/training/
LINUX LOGS
Generally found under /var/log
Logging is discretionary
Amount and format of logs left to developers
SAMPLE LOG MESSAGES
Oct 5 13:13:53 VulnOSv2 sshd[2624]: Accepted password for mail from
192.168.210.131 port 57686 ssh2
Oct 5 13:13:53 VulnOSv2 sshd[2624]: pam_unix(sshd:session): session
opened for user mail by (uid=0)
Oct 5 13:14:04 VulnOSv2 sudo: mail : TTY=pts/1 ; PWD=/var/mail ;
USER=root ; COMMAND=/bin/su -
Oct 5 13:14:04 VulnOSv2 sudo: pam_unix(sudo:session): session opened
for user root by mail(uid=0)
Oct 5 13:14:04 VulnOSv2 su[2721]: pam_unix(su:session): session
opened for user root by mail(uid=0)
Oct 5 13:18:48 VulnOSv2 sshd[2624]: pam_unix(sshd:session): session
closed for user mail
aulast
aulastlog
Produce output like last and lastlog using audit logs
THANK YOU!
Any final questions?
Thanks for listening!
[email protected]
@hal_pomeranz
https://archive.org/details/HalLinuxForensics
https://wildwesthackinfest.com/deadwood/training/