This cheat-sheet gives incident responders, SOC analysts, and digital forensics investigators a fast reference to the most important digital forensic artifacts to collect during an investigation on a Linux system 😎👆
Find high-res pdf books with all my Linux and cybersecurity related infographics from https://study-notes.org
... Read moreWhen conducting digital forensic investigations on a Linux system, understanding and recognizing key forensic artifacts is vital. These artifacts provide a detailed timeline and evidence of system activity, network connections, user behaviors, and potential intrusion indicators. Among the most important system and kernel artifacts are log files such as /var/log/syslog, /var/log/messages, /var/log/auth.log, and /var/log/kern.log, which record various system messages, authentication attempts, and kernel events. These logs can help reconstruct an attacker's steps or system errors that might have been exploited.
Network evidence files like /etc/hosts, /etc/resolv.conf, and active network connection outputs (ss/netstat) reveal communication patterns that may indicate unauthorized data transfers or command-and-control connections. Understanding the configuration and changes in these files aids in identifying malicious activity.
File system and storage artifacts such as /etc/fstab, /proc/mounts, and user-specific history files (.bash_history, .bashrc) provide insight into system mount points, filesystem changes, and user command usage. These files often tell a story about what commands were run, which files were accessed, and how the system was utilized before and during an incident.
User activity evidence located in home directories, including SSH configurations (/home/*/.ssh/), user profile scripts, and temporary files, can reveal unauthorized login attempts or persistence mechanisms installed by attackers. Tracking these artifacts helps investigators map out user interactions during a compromise.
Application-specific evidence, like web server logs (/var/log/apache2, /var/log/httpd/) and browser cache data (~/.mozilla/firefox/, ~/.config/google-chrome/), is essential for understanding web-based attacks or data exfiltration via browsers or web services.
Additionally, artifacts associated with scheduled tasks and system services, such as cron jobs (/var/spool/cron/, /etc/cron*), systemd service units (/lib/systemd/system/*.services), and startup scripts (/etc/rc.local, /etc/init.d/), often harbor evidence of persistent threats or malicious automation.
Forensic imaging and metadata collection tools like dd, hash verification with md5sum/sha256sum, and frameworks such as log2timeline, plaso, sleuthkit, and autopsy facilitate the thorough analysis and timeline reconstruction of an incident.
Utilizing these artifacts in a structured and methodical investigation allows cybersecurity professionals to uncover attack vectors, lateral movements, and data exfiltration methods. Having a well-prepared cheat-sheet or reference that consolidates these critical files and paths greatly improves the efficiency and effectiveness of incident response and forensic analysis on Linux platforms.