Linux Intrusion Analysis
Overview
Phase 1: Preparation & Scoping
Initial Assessment Questions
Documentation Setup
Phase 2: Live Response & Triage
2.1 System Information Collection
2.2 Network Connections Analysis
2.3 User and Account Analysis
2.4 Process Analysis
2.5 Scheduled Tasks Analysis
2.6 Persistence Mechanism Analysis
2.7 Webshell Detection
2.8 File System Analysis
2.9 Kernel and Module Analysis
2.10 Command History Analysis
2.11 System Resource Anomalies
Phase 3: Evidence Collection
3.1 Live Response Data Export
3.2 Disk Imaging
3.3 Memory Acquisition
Phase 4: Analysis & Investigation
4.1 Log Analysis
4.2 Artifact Analysis
4.3 Memory Analysis with Volatility
4.4 Disk Analysis
4.5 File Recovery
4.6 Automated Scanning
Phase 5: Privilege Escalation Hunting
Indicators of Privilege Escalation Attempts
Phase 6: Reporting
Investigation Report Structure
IOC Export Format
Quick Reference Commands
Network
Purpose
Command
Processes
Purpose
Command
Files
Purpose
Command
Persistence
Purpose
Command
Tool Quick Install
References
Last updated