Linux forensic artifacts

This cheat-sheet gives incident responders, SOC analysts, and digital forensics investigators a fast reference to the most important digital forensic artifacts to collect during an investigation on a Linux system 😎👆

Find high-res pdf books with all my Linux and cybersecurity related infographics from https://study-notes.org

#linux #cybersecurity #infosec #pentesting #hacking

2025/11/18 Edited to

... Read moreWhen conducting digital forensic investigations on a Linux system, understanding and recognizing key forensic artifacts is vital. These artifacts provide a detailed timeline and evidence of system activity, network connections, user behaviors, and potential intrusion indicators. Among the most important system and kernel artifacts are log files such as /var/log/syslog, /var/log/messages, /var/log/auth.log, and /var/log/kern.log, which record various system messages, authentication attempts, and kernel events. These logs can help reconstruct an attacker's steps or system errors that might have been exploited. Network evidence files like /etc/hosts, /etc/resolv.conf, and active network connection outputs (ss/netstat) reveal communication patterns that may indicate unauthorized data transfers or command-and-control connections. Understanding the configuration and changes in these files aids in identifying malicious activity. File system and storage artifacts such as /etc/fstab, /proc/mounts, and user-specific history files (.bash_history, .bashrc) provide insight into system mount points, filesystem changes, and user command usage. These files often tell a story about what commands were run, which files were accessed, and how the system was utilized before and during an incident. User activity evidence located in home directories, including SSH configurations (/home/*/.ssh/), user profile scripts, and temporary files, can reveal unauthorized login attempts or persistence mechanisms installed by attackers. Tracking these artifacts helps investigators map out user interactions during a compromise. Application-specific evidence, like web server logs (/var/log/apache2, /var/log/httpd/) and browser cache data (~/.mozilla/firefox/, ~/.config/google-chrome/), is essential for understanding web-based attacks or data exfiltration via browsers or web services. Additionally, artifacts associated with scheduled tasks and system services, such as cron jobs (/var/spool/cron/, /etc/cron*), systemd service units (/lib/systemd/system/*.services), and startup scripts (/etc/rc.local, /etc/init.d/), often harbor evidence of persistent threats or malicious automation. Forensic imaging and metadata collection tools like dd, hash verification with md5sum/sha256sum, and frameworks such as log2timeline, plaso, sleuthkit, and autopsy facilitate the thorough analysis and timeline reconstruction of an incident. Utilizing these artifacts in a structured and methodical investigation allows cybersecurity professionals to uncover attack vectors, lateral movements, and data exfiltration methods. Having a well-prepared cheat-sheet or reference that consolidates these critical files and paths greatly improves the efficiency and effectiveness of incident response and forensic analysis on Linux platforms.

Related posts

Free Software Engineering Courses from IBM
If you are interested in Software Engineering, these FREE courses from IBM make learning easy and accessible for everyone 1. Introduction to Cloud Computing. In this course you are going to learn about: * Define cloud computing and explain essential characteristics, history, the business case fo
Ivy League Help

Ivy League Help

69 likes

Crown CarPlay effect
Crown CarPlay effect #appel car play #carplay #toyota #linux #androidauto
QUN MO

QUN MO

1 like

Beginner Streamer Tips
realized this vid is pretty fast so comment if you need me to go more in depth or if you need help!!! <3 #obs #streamingtips #beginnerstreamer
melo.byx

melo.byx

10 likes

Powerful Websites
#freewebsite #website #fromsoftware #fyplemon8 #fyp
Tha Smoke Websites

Tha Smoke Websites

611 likes

An infographic titled 'Linux curl Command Examples' provides a comprehensive list of curl commands. It covers HTTP GET operations with options like user-agent and custom headers, HTTP POST/PUT operations for data and file uploads, and various file download operations including resuming and rate-limiting. Created by Dan Nanni.
Linux curl command examples
The curl command is a flexible tool that lets you send or receive data from servers using protocols like HTTP, HTTPS, FTP, and others, all from the command line Here are useful curl command examples 😎👆 #devops #opensource #software #TechTips Find high-res pdf books with all my #lin
Dan Nanni

Dan Nanni

7 likes

These 5 websites feel illegal to know!
#gettoknowme
Useful AI Websites & Tutorials

Useful AI Websites & Tutorials

30 likes

A woman stands on a palm-lined street with text overlay 'FREE COURSES you can take online to boost your resume' and logos for Udemy and Coursera, promoting free online learning platforms.
A screenshot of Google search results for 'free udemy courses' and a list of various free Udemy courses like 'Canva Essentials' and 'Git & GitHub Crash Course', demonstrating options for professional development.
A screenshot of Coursera's 'Popular Free Courses' section, showcasing university-partnered courses from institutions like Yale and Princeton, highlighting options for resume-boosting education.
FREE courses to put on your resume 💻
What do I love more than online learning? FREE online learning! Popular online course providers like Udemy and Coursera offer libraries of free courses anyone can take! And they span a huge variety of topics from coding to public speaking to art history. In today’s job market, having in deman
hannah 💟

hannah 💟

510 likes

A computer screen displays the Anki flashcard app with various Japanese language decks, including 'common anime words' and 'Japanese Essential Verbs'. The screen is on a desk with decorative items, and text overlay says 'you need this flashcard app for studying!'.
A close-up of the Anki app's deck interface shows options to download shared decks or create new ones. Text highlights that Anki is free for multiple platforms and allows syncing between devices.
A web browser shows the AnkiWeb Shared Decks page, displaying a vast library of user-created Japanese language flashcard decks available for import. Text emphasizes the 'huge library of shared decks'.
📚📑✏️ This is the best tool for studying!
If you are studying anything, especially languages, then you should be using flashcards! Anki is the best app out there for making and studying digital flashcards, and the best part is it’s FREE! Not only that, but you can also download other users’ flashcard decks for free or create your own based
astarael.games

astarael.games

56 likes

I’m Linuxvr!
#gettoknowme #gorillatag #fyp #newcontentcreator #linux
🧑‍💻🐧Linuxvr_Offical🐧🧑‍💻

🧑‍💻🐧Linuxvr_Offical🐧🧑‍💻

1 like

A Linux I/O Redirection cheat sheet created by Dan Nanni, detailing various shell commands for redirecting, appending, and combining standard input, output, and error streams. It includes examples like `cmd < file`, `cmd > file`, `cmd 2> file`, `cmd > file 2>&1`, and `cmd <<< "string"` with their corresponding descriptions.
Linux I/O redirection cheat sheet
Here is a concise reference of Linux shell operators for redirecting, appending, and combining standard input, output, and error streams 😎👇 Find high-res pdf ebooks with all my Linux related infographics at https://study-notes.org #linux #sysadmin #infosec #devops #softwareengine
Dan Nanni

Dan Nanni

6 likes

HOW TO CATCH A CHEATER
MORGANCYBERHELP

MORGANCYBERHELP

13 likes

Free Back-End Development Courses from IBM
If you are interested in Back-End Development, these FREE courses from IBM make learning easy and accessible for everyone 1. Hands-on Introduction to Linux Commands and Shell Scripting. In this course you are going to learn about: * Describe the Linux architecture and common Linux distributions
Ivy League Help

Ivy League Help

20 likes

A Linux watch command cheatsheet created by Dan Nanni, listing various commands to monitor system metrics in real-time. Examples include tracking CPU/memory usage, disk space, log file growth, network activity, and system errors, with refresh intervals specified.
Linux watch command cheatsheet
Ever wish you could just run a command and keep seeing it update automatically as things change? That is exactly what the watch command does on Linux Here are useful examples of the watch command 😎👆 Find high-res pdf ebooks with all my Linux related infographics at https://study-notes.org
Dan Nanni

Dan Nanni

4 likes

An infographic titled 'Understanding Linux Signals' illustrates signal sources like kernel-detected faults, system calls, and kernel subsystems. It shows how processes handle signals through default actions, custom handlers, or ignoring them. A table details common signals, their numbers, default actions, and triggering conditions.
Understanding Linux signals
“Signals” provide a lightweight mechanism for the Linux kernel and other processes to asynchronously notify a running process about events such as faults, user interrupts, or system conditions 😎👆 Find high-res pdf ebooks with all my Linux related infographics at https://study-notes.org #linu
Dan Nanni

Dan Nanni

7 likes

defiantfreedom

defiantfreedom

3 likes

Student Teaching Series: What to bring to student teaching!! Please let me know if you guys have ANY questions and I will do my best to make videos over the next couple weeks for you. I’m an open book and would LOVE to pass on anything I’ve learned. ☺️ #teachersoftiktok #middleschoolteacher
Kelly Having

Kelly Having

5 likes

Fujitsu Alphard upgraded with CarPlay, unbeatable
Fujitsu Alphard upgraded with CarPlay, unbeatable sound quality #carplay #toyota #lexyus #linux #carplayinterface Ourisman Chantilly Toyota
CAR TEC

CAR TEC

2 likes

A Linux Cheatsheet for Engineers from @thealpha.dev, listing various commands categorized into File System Operations, File Permissions, Process Management, Networking, System Information, Package Management, Shell Scripting, User and Group Management, File Transfer, and System Services. A penguin on a skateboard is at the bottom.
Linux cheat sheet✨️
Where are my tech babes at?👩🏿‍💻 This is something I'm learning in school😍 It's been super fun typing things into the command line and actually getting a response🥹💕💕💕 One of my classmates shared this cheat sheet to make using Linux easier #imdoingsomethingright #CybersecurityAwarenessMon
Deya!

Deya!

27 likes

🛑 Stop paying for Photoshop or struggling with Canva limitations… 🎯 GIMP is the free design software I teach all my students to use—and it works like a charm for custom products. 👩🏽‍💻 In this quick tutorial, I’ll show you exactly how to download it, set it up, and pin it to your desktop so you’r
www.DesigningMadeEasy.com

www.DesigningMadeEasy.com

14 likes

Ça c'est les pieds d'un français 🇫🇷 #lemon8 #lemon8fr #tiktok #tiktokfr
pierrebg2004

pierrebg2004

4 likes

A person with long dark hair and a straw hat walks through a sunny public square. Overlay text reads "CYBERSECURITY CAREER Tips to get started," introducing advice for a career in cybersecurity.
A person in a white dress walks on a path next to green bushes. Overlay text advises to "Build a Strong Technical Foundation" by learning networking basics, operating systems, and scripting languages.
People walk across a street with benches and trees in the background. Overlay text suggests to "Get Hands-On Experience" through CTF competitions, cybersecurity challenges, and setting up a home lab.
Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

A computer monitor displays a Linux Mint desktop with its distinctive logo. The screen shows numerous folders labeled with names of classic gaming systems such as Sega Genesis, Atari 2600, Gameboy, Super Nintendo, MAME Roms, Neo Geo CD, Nintendo 64, Nintendo DS, PS2, and PS3.
Linux Mint User
I don't have windows installed on my computer at all. I use Linux Mint and I absolutely love it! #linux #computer #Lemon8Diary
Robert Ramos

Robert Ramos

10 likes

Useful sysdig command examples
Sysdig is one of those hidden gem tools that shows exactly what your Linux system is doing in real time — system calls, containers, network traffic, file access — everything, no guessing. Here are useful sysdig command examples 😎👆 Find high-res pdf ebooks with all my cybersecurity related inf
Dan Nanni

Dan Nanni

5 likes

So you want to “learn Linux”?
Here are the harsh truths nobody tells you… 🐧 Most Linux roles aren’t entry level. The CLI is mandatory. Certs don’t matter without skill. If that scared you… good. Because Linux isn’t for the weak. Still want to continue? #linux #cybersecurity #computerscience
Professor Linux

Professor Linux

1 like

Yazi: a terminal-based Linux file manager
Yazi is a blazingly fast terminal file manager written in Rust, based on non-blocking async I/O. It aims to provide an efficient, user-friendly, and customizable file management experience within Linux terminals. A strong contender for the best TUI-based file manager title 😎👆 Find high-res pdf
Dan Nanni

Dan Nanni

3 likes

Online learning resources for software developers
Want to pick up a new programming language or master a DevOps tool? No problem! Plenty of great learning resources are available online for free! 😎👆 #devops #coding #programming #softwaredeveloper
Dan Nanni

Dan Nanni

82 likes

Linux command chaining
POSIX-compliant Linux shells (bash, zsh, sh) support command chaining — a simple way to link multiple commands and control whether the next one runs based on success, failure, or just order of execution 😎👆 Find a high-res pdf book with all my Linux related infographics from https://study-notes.o
Dan Nanni

Dan Nanni

6 likes

Cave Dwellers Built the First Data Center
When your ancestors were running Linux before fire was invented. Stone age server farms hit different. #midjourney #cavecore #techno #ancient #cyberpunk
HalluciNEET 9000

HalluciNEET 9000

2 likes

defiantfreedom

defiantfreedom

77 likes

Programming an Arduino as a serial controller
I programmed an Arduino Mega to be a serial controller for Xlights to control WS2811 addressable LEDs I am working on the last two videos for the DIY Christmas Light Controller mini-series, and it's finally time to start controlling LEDs. My original plan was to use an ESP32 based Light c
EETEngineer

EETEngineer

12 likes

The image illustrates how Linux cgroups manage resources like CPU, Memory, Storage I/O, and Network. It shows creating cgroups, attaching a process (PID 12345) to `cgroup3` via `/sys/fs/cgroup/cgroup3/cgroup.procs`, and defining its resource limits (e.g., 512M memory.max, 10M/5M disk I/O).
How Linux cgroups work
On Linux, cgroups control and isolate CPU, memory, and I/O per process or container—this is what makes predictable container performance possible 😎👆 Find high-res pdf ebooks with all my Linux and DevOps related infographics from https://study-notes.org #linux #docker #kubernetes #de
Dan Nanni

Dan Nanni

1 like

linux distro linux ricing :)
Linux Ricing #linux #computer
☬hyprland✇

☬hyprland✇

6 likes

I am 32 years old today!!!
Sarah Jo Ponzio Official

Sarah Jo Ponzio Official

3 likes

Estas tres comidas son muy normales que me digan que lo hacen mis pacientes porque no sabían que era algo malo .. estos alimentos son muy altos en su índice glucemico y tiene el poder de subir tu azúcar por lo tanto disminúyelos #nutrióloga #bajarazucar #nutricion #comida
Nutriologaziomaramarquez

Nutriologaziomaramarquez

11 likes

An infographic titled 'TOP YOUTUBE CHANNELS TO LEARN' presents a list of tech subjects such as Java, Python, SQL, MS Excel, and their corresponding YouTube channels like Neso Academy, Corey Schafer, Joey Blue, and ExcellsFun, along with other topics and channels.
💻
#tech #study #Lemon8Diary #learning
ReNisha

ReNisha

474 likes

A tutorial thumbnail for OpenClaw AI, featuring a red robot and a laptop screen displaying installation commands like 'installing openclaw adb' and 'Securing OpenClaw bot'. The title reads 'OpenClaw TUTORIAL SET UP & SECURE YOUR BOT'.
The easy way to setup OpenClaw on Windows or Linux
Full article: https://gzmato.com/blog #openclaw
gzmato.com

gzmato.com

6 likes

An infographic titled 'Useful TUI Linux Software' with a Tux penguin logo. It defines TUI as Text-based User Interface for terminal environments and lists various software categorized under Disk Manager, System Monitor, Web Browser, Network Manager/Monitor, Multimedia, GPT, Git, Coding, File Manager, and Messaging.
Useful TUI software on Linux
Linux TUI (Text User Interface) software offers a user-friendly way to interact with applications directly from the terminal, using text-based menus and interfaces instead of a graphical desktop environment Here are a categorized list of useful TUI software available on Linux 😎👆 #software #o
Dan Nanni

Dan Nanni

4 likes

An infographic titled 'Linux netcat Command Examples' lists various `nc` commands for network tasks like port scanning, file transfer, creating shells, and streaming. It includes commands for TCP/UDP, IPv6, and persistent listeners, credited to Dan Nanni.
Useful netcat command examples
Netcat is the Swiss army knife of networking. It lets you read and write data over TCP or UDP, and infosec folks use it all the time for things like quick port scans, grabbing service banners, or setting up reverse shells. Here are useful netstat command examples 😎👆 Find high-res pdf ebooks w
Dan Nanni

Dan Nanni

3 likes

An infographic titled 'Linux Security Hardening' by Dan Nanni, listing essential commands for system upgrades, user and SSH security, firewall setup, file permission checks, service management, port monitoring, USB device control, legacy service checks, and security auditing tools.
Linux system hardening commands
Securing a system against threats requires reducing vulnerabilities, tightening access, and disabling unnecessary services. Here are useful Linux commands for that 😎👆 #linux #softwaredeveloper #TechTips #upskill Find high-res pdf books with all my #cybersecurity related infographics
Dan Nanni

Dan Nanni

10 likes

Lemongrass66

Lemongrass66

9 likes

LEVEL UP
#linux #technology #cybersecurity #code
Luna Bright

Luna Bright

2 likes

Stop paying monthly for AI tools
Pinokio lets you run video, image and voice models like Flux, Stable Diffusion and Wan locally on your computer with unlimited private usage, no internet needed.
Krofile.com

Krofile.com

0 likes

Installing Linux Mint 22.1 Beta
#linux #lemon8creator #linuxmint #linuxgaming
Channel82TV

Channel82TV

1 like

This image displays an X.com post by @openclaw announcing that their AI assistant project has surpassed React in GitHub stars. The post highlights OpenClaw's rapid development and includes a partial "Star History" graph showing openclaw/openclaw's star count exceeding facebook/react's.
OpenClaw surpassing React in GitHub stars is a notable milestone. React, like Linux, represents long-standing infrastructure, but this reflects a broader shift as AI projects play a growing role in capturing developer attention and shaping industry innovation. #openclaw
John A. J. Kwok

John A. J. Kwok

1 like

Android Franklin Alva Lopez ag

Android Franklin Alva Lopez ag

0 likes

An infographic titled 'Linux /proc Filesystem' by Dan Nanni, featuring the Linux penguin mascot. It lists numerous /proc entries like /proc/cpuinfo, /proc/meminfo, and /proc/[PID]/status, detailing the system information each provides, such as CPU, memory, and process statistics.
Linux /proc filesystem
The Linux /proc filesystem is a virtual interface that exposes live system information and kernel parameters, enabling users to monitor hardware and processes and adjust kernel settings at runtime Here are a list of useful /proc entries 😎👆 #software #softwaredeveloper #computer Find
Dan Nanni

Dan Nanni

5 likes

See more