• If you're wrong, admit it.
• If you're confused, ask questions.
• If you're stuck, seek for help.
• If you make mistake, learn from it.
• If you learn something, teach others
Daily Linux Forensics Trivia #10 - When investigating a live Linux system, how can you detect if a process is running from a deleted binary? [and don't forget to sign up for live Linux forensics training wildwesthackinfest.com/deadw…]
From the early days of Unix file systems, permissions are stored in a packed two-byte field. The upper four bits are the file type. The remaining twelve bits track set-UID, set-GID, "sticky", and then "rwx" perms for owner, group, and other.
Trivia Answer #8 — Look in $HOME/.local/share/recently-used.xbel for the Nautilus/Nemo file browsing history. XML formatted doc includes file name, app used to open file, and first/last visit times.
Speaker tip: always make one of your presentation slides a full frame screenshot of the Windows Blue Screen of Death, and then forget which slide it is. The unexpected shot of adrenaline will help to keep you focused and alert during your presentation.
It’s hard to imagine a better brand ambassador than Lesley— exec at one of the hottest tech companies on the planet, accomplished hacker, community leader, veteran who helps other veterans, expert martial artist in multiple disciplines. Always willing to fight the good fight.
Several folks noted, however, that the known_hosts file is just a text file and can be edited. So perhaps that entry is bogus. I recommend comparing the public host key from the remote system against the public key in the known_hosts entry as an additional level of validation.
Trivia Answer #7 — Shout out to @DfirNotes for the first correct response. An entry in known_hosts means the account established an SSH connection to the remote host long enough to exchange public keys. It does NOT tell you whether or not there was a successful login.
Hey @KirrinFinch, one of our community leaders is feeling a profound sense of grief due to the loss of their Kirrin Finch suit. Perhaps you can help Lesley out? Nobody could be more deserving, after helping so many others.
Just such a miserable situation. It was from a company called Kirrin Finch that makes suits for non gender conforming people, and it was super gender-affirming, too. I got to wear it once and I was so damn excited to get it.
Also people w/ brain fog are also good at hiding it—it’s intermittent and they just don’t see people on the worst days. Stigma also motivates them to present as normal in social situations or doctors’ appts, furthering the false idea that they’re fine. 10/ theatlantic.com/health/archi…
Facebook scam, I’m selling a desk and they’re pretending to be interested. They’re using my cell number to attempt to sign up for google voice. Remember never share your 2FA codes.
We wanted to make sure people who struggle with literacy and with getting assistance to vote understood their rights under federal law. So @asiakmfields created a guide in plain language and available in 11 languages. Please share with anyone who might need it.
You have the right to vote even if you don’t speak or read English. This guide will tell you about your right to ask for help, how to vote and what to do if you have problems.
Available in 11 languages
🧵👇
propublica.org/article/guide…
We updated our blog on the Linux trojan XorDdos with new information on initial access and payload, including details on a rootkit component that we found while investigating a XorDdos sample we saw in June 2022: msft.it/6012jvVgq
Daily Linux Forensics Trivia #7 -- You find an entry for a suspicious IP address in /root/.ssh/known_hosts. What conclusions can you draw from this artifact?