Skip to content

TheRashaSharif/Linux-Forensics

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

Linux-Forensics

Autospy deleted files recovery

This is an exercise provided by the TryHackMe DFIR course

All images and copyrights are protected for TryHackMe

Description

Project: OS and accounts information Objective: Use the command line to find user and accounts information

Tools/ Utilities Used

  • Linux Virtual Machine
  • terminal ( command tool)

Tasks:

1- Find the User ID (UID) of the tryhackme user account.

2- Find the user (s) /members in the group audio.

3- Find out how long a session lasted on Sat April 16 at 20:10.

Launching the Linux VM:

There is a terminal on the desktop to use for commands. The command line to know the OS release info is: cat /etc/os-release

Linux OS

The other command on the terminal is name -a which is also going to provide the release and logged user info.

1- The command we will be using for the user ID tryhackme is cat/etc/passwd as shown above.

When scrolling down the user information is tryhackme:x:1001:1001:tryhackme,,,:/home/tryhackme:/bin/bash

user ID is tryhackme, the x means the password is saved in the shadow file, and the user UID is 1001 /home/tryhackme is the home path and the last values are the shell meaning we can log into it.

If the user name has the value false like this one gdm:x:129:135:Gnome Display Manager:/var/lib/gdm3:/bin/false the false value means you can't log in to this account. It is recommended to set the value to false to avoid vulnerability.

2- To find a user(s) in a group we will use the command cat\etc\group no s in the end, I know it is tempting to type groups, but this will be the result

The group audio has the following two users:

Linux group

3- To view a session activity we will have to change the directory to cd /var/log

this will display all the logs of launched activities. $ cd /var/log Then /var/log$ ls

The sessions logs are stored in wtmp and we must elevate to sudo before getting the access /var/log$ sudo last -f wtmp

The session was successfully initiated on Sat April 16 at 20:10. lasted an hour and 32 minutes

Linux date and time q3

This concludes this exercise. The last one was a tough one!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published