Just a reminder that I’m always on the lookout for compromised Linux images that I can use for labs in my Linux Forensics training! Please RT for reach...thanks!

Jan 28, 2020 · 1:26 PM UTC

2
40
1
34
Replying to @hal_pomeranz
Do you have guidelines on how potentially sensitive content should be scrubbed from them? This seems hard to do in a way that doesn't defeat the purpose. For example logs of non-attacker activity likely reveal PII.
2
1
That’s why it’s so hard for people to share images in many cases. I don’t have a good solution for this.
1