Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Linux Logs Investigations

Premium room

Explore Linux system logs for effective incident response.

medium

60 min

7,076

User profile photo.

To access material, start machines and answer questions login.

Just like a map guides explorers, logs can be used to navigate system administrators and security analysts through the intricate world of . This room equips you with essential skills to decipher these logs, focusing on core areas like logging levels, kernel whispers via /var/log/kern.log, user interactions, the watchful eye of auditd, the versatile syslog, and the modern journal. By the end, you'll be able to unearth hidden clues and safeguard your systems.

Objectives

  • Learn about the different types of logs recorded on Linux systems.
  • Learn how to perform forensic analysis through logs on Linux systems, focused on determining malicious processes, services, and scripts.
  • Hunt malicious processes, services, and configurations to mitigate further compromise in a hands-on IR scenario.

Prerequisites

To understand how to work with Linux logs for forensic investigations, you should have a solid grasp of the Linux operating system basics and system hardening concepts.

Connecting to the machine

To start the VM, press the green Start Machine button attached to this task. The machine will start in split view. In case it is not showing up, you can press the blue Show Split View button at the top of the page.

Answer the questions below
I'm ready to learn about Linux logs!

Ready to learn Cyber Security?

The Linux Logs Investigations room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.