Tips & Tricks // Analyzing Linux Artifacts
You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.
Whether you’re working a malware or ransomware incident response case in an enterprise setting or you show up to a crime scene and your suspect’s computer is a Linux system, having a base-level understanding of Linux artifacts and how to analyze them will keep your investigation moving.
In this Tips & Tricks session we’ll highlight some important Linux artifacts including User Accounts, SSH Activity, System Logs—and more—and how they can be analyzed using AXIOM Cyber or AXIOM.