Just a reminder that I’m always on the lookout for compromised Linux images that I can use for labs in my Linux Forensics training! Please RT for reach...thanks!
2
40
1
34
Do you have guidelines on how potentially sensitive content should be scrubbed from them? This seems hard to do in a way that doesn't defeat the purpose. For example logs of non-attacker activity likely reveal PII.
2
1
Replying to @RichFelker
That’s why it’s so hard for people to share images in many cases. I don’t have a good solution for this.

Jan 28, 2020 · 2:00 PM UTC

1