LX0.12 Check My Knowledge
Check My Knowledge
1. What is the primary reason Linux incident response requires a different methodology from Windows?
2. An attacker truncates /var/log/auth.log and runs unset HISTFILE. Which evidence source is most likely to still contain a record of their SSH login?
last commandwtmp is a binary file that records login and logout events independently of auth.log. Attackers who truncate auth.log frequently forget about wtmp, which is managed by a different subsystem. The systemd journal also records SSH events independently and is checksummed, making it harder to tamper with.3. A file at /usr/local/bin/svc_monitor has mtime of 2024-06-15 and ctime of 2026-03-28. What does this indicate?
touch to backdate the modification timetouch -t. A discrepancy where mtime is older than ctime indicates deliberate timestamp manipulation — the attacker created or modified the file on 2026-03-28 and backdated the mtime to 2024-06-15 to avoid detection.4. A Kubernetes pod was restarted by a liveness probe 10 minutes before you were notified. Which evidence source survived the restart?
kubectl logs --previous) are retained for the previous instance. The container's filesystem, /proc entries, /dev/shm contents, and network state are all destroyed when the container restarts.5. You run ps auxf and see 187 processes. A /proc enumeration finds 190 process directories. What is the most likely explanation?
ps uses, hiding 3 attacker processes — direct /proc reads bypass the hooksps uses to enumerate processes, filtering out attacker processes from the output. Reading /proc directly reads from the kernel's process list, bypassing the rootkit's hooks. The discrepancy between ps output and direct /proc enumeration is a strong indicator of rootkit presence.6. You SSH into a compromised server and run cat /var/log/auth.log — the file does not exist. What is your immediate next step?
cat /etc/os-release to identify the distribution — the system is likely RHEL-based where the authentication log is /var/log/secureauth.log most commonly indicates a RHEL/CentOS/Rocky/Amazon Linux distribution, where the equivalent file is /var/log/secure. Always identify the distribution first with cat /etc/os-release, then use the correct evidence paths for that distribution family.7. What does rpm -Va report on a RHEL-based system, and why is it forensically significant?
rpm -Va compares every file from every installed package against the original RPM manifest. Output codes indicate what changed: S (size), 5 (MD5 checksum), T (mtime), M (mode/permissions), U (user), G (group). If an attacker replaced a system binary like /usr/bin/ps with a trojaned version, rpm -Va flags it.8. A compromised web server runs on a system with SELinux in enforcing mode. The attacker's web shell attempts to read /etc/shadow. What happens?
httpd_t context, and /etc/shadow has the shadow_t context. The SELinux policy does not permit httpd_t to read shadow_t. The attempt is blocked and an AVC denial is logged in /var/log/audit/audit.log, providing evidence of the attacker's credential harvesting attempt.9. You need to acquire memory from a compromised server. Why must LiME be pre-compiled for the target's exact kernel version?
vermagic string against its own version and rejects mismatches. This means you must pre-compile LiME for every kernel version in your infrastructure before an incident occurs — you cannot compile during the incident without kernel headers (rarely installed on production servers).10. Which volatile filesystem is specifically used by attackers because files written there never touch the disk?
/dev/shm is a RAM-backed tmpfs filesystem. Files written there exist only in memory and are never written to disk. This makes them invisible to disk forensics — if you image the disk without first collecting /dev/shm contents from the live system, the attacker's staged files are permanently lost. /tmp may also be tmpfs on modern distributions, but /dev/shm is always RAM-backed.11. An investigator needs to examine a compromised AWS EC2 instance but has only AWS console access — no SSH. What is the most forensically sound first action?
12. What is the minimum Linux IR lab configuration needed to complete the free-tier exercises in this course?
How was this module?
Your feedback helps us improve the course. One click is enough — comments are optional.
You're reading the free modules of this course
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.