You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -87,7 +94,7 @@ Remember to document your answers and reflections along the way, Let’s dive in
87
94
# Chapter 5. Linux Artifacts & Live Response
88
95
<ahref="Subjects/5. Linux Artifacts & Live Response/Artifacts.html"target="_blank">Linux Artifacts guide</a><br>
89
96
<ahref="Resources/PomeranzLinuxForensics.pdf#page=5"target="_blank">PomeranzLinuxForensics page 5-13(including Exercise) By Hal Pomeranz</a><br>
90
-
<ahref="Resources/PomeranzLinuxForensics.pdf"target="_blank">PomeranzLinuxForensics Exercise 2-4(Honeypot Lab) By Hal Pomeranz</a>
97
+
<ahref="Resources/PomeranzLinuxForensics.pdf#Page=25"target="_blank">PomeranzLinuxForensics (Pages 25, 35, 49) Exercise 2-4(Honeypot Lab) By Hal Pomeranz</a>
91
98
92
99
93
100
## Questions
@@ -97,15 +104,11 @@ Remember to document your answers and reflections along the way, Let’s dive in
97
104
4. User login information is critical for tracking user activity. Choose three artifacts from the list that log user activity and explain how each could help determine whether unauthorized access has occurred.
98
105
99
106
# Chapter 6. Linux Bonus
100
-
- Linux boot
101
-
- Linux ptrace
102
-
103
-
ptrace implementations(strace, ltrace)
104
-
login mechanism
105
-
services
106
-
boot mechanism
107
-
signals
108
-
syscalls
109
-
suid
110
-
111
-
107
+
<ahref="Resources/ulk3.pdf"target="_blank">Understanding the Linux Kernel</a><br>
0 commit comments