Linux forensics - locations of interest - Magnet Forensics Quick Reference Guide part 2

Linux forensics - locations of interest - Magnet Forensics Quick Reference Guide part 2
💝♥️❤️ SUBSCRIBE for more videos: kzread.info...
Difficulty Level: intermediate
Prerequisites: basic understanding of the linux file system
In this video, we will look at the Quick Reference Guide for Linux Artifacts from Magnet Forensics.
Video timeline
00:00 intro
00:35 Startup Items
03:29 Scheduled Tasks
06:56 System and Application Logs
09:43 System Files
⭕️ For part 1 of the Magnet Forensic Quick Reference Guide: • Magnet Virtual Summit ...
Download of Linux forensics locations of interest courtesy of Magnet Forensics:
www.magnetforensics.com/resou...
Linux distro:
CAINE  linux (www.caine-live.net)
Virtualization software:
Virtual Box (virtualbox.org)
Icons made by freepik from @flaticon www.flaticon.com/authors/freepik
Icons made by Smashicons from www.flaticon.com/authors/smash...
I am not an employee, contractor, affiliate, representative of Magnet Forensics. This video nor my channel is being sponsored by Magnet. I just thought this information would be useful to those forensic examiners who have to look at a Linux System.
This course was designed to provide information on how to use the command line environment in a Unix/Linux system to accomplish tasks such as imaging, data acquisition, and archiving.  This course covers the basics of Unix/Linux commands that allow users to view and edit text files, obtain hardware and system information, partitioning and formatting, process related commands, manipulating disks and partitions, imaging, archiving, logical acquisition, live system response, and basic networking.
This would be beneficial for folks who are interested in digital forensics, incidence response, system administration, ethical hacking, or just plain linux.  his course covers material for beginners as well as for advanced users. This course would also be helpful if you are considering taking the CompTIA Linux+ certification test.
#DFIR #LinuxForensics #LinuxArtifacts

Пікірлер: 2

  • @bilalbhatti386
    @bilalbhatti386 Жыл бұрын

    Well explained

  • @BlueMonkey4n6

    @BlueMonkey4n6

    Жыл бұрын

    Thank you for watching.