To access material, start machines and answer questions login.
powers most of the world’s servers because it’s reliable, secure, and performs well. This includes everything from websites to big cloud services. Most of the fastest computers in the world run on because they can handle huge amounts of data and complex tasks. Also, a large chunk of the internet is hosted on servers.
Because is used in many important places, it’s a prime target for hackers. From a security point of view, we need to be more vigilant about the latest threats and attacks, as threat actors are gaining more capabilities with time.
Incident Scenario
You are a Analyst at Cybertees Pvt Ltd. Your manager gave you a machine that the Red Team compromised. The Red Team has planted various footprints on the machine for you to investigate.
Your task is to perform live forensics on this server to determine the level of damage and identify the attack footprints.
Learning Objective
In this room, we will cover the following learning objectives:
- Learn the importance of creating a system profile.
- How to perform live forensics in .
- How to examine the running processes.
- How to investigate footprints on the disk.
Prerequisites
This room expects users to have a basic understanding of forensics
and the environment. The following rooms provide the basic
knowledge needed to move forward in this room:
Let’s dive in.
Ready to learn Cyber Security?
The Linux Live Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in