Chapter 5

Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems

Solutions in this chapter:

ent Malware Discovery and Extraction from a Linux System

ent Using Linux as a Forensic Platform

Introduction

An in-depth forensic examination of a Linux system can answer important questions about a malware incident, including how malware was placed on the system, what it did, and what remote systems were involved.

A working knowledge of Linux, and a familiarity with the ext2 and ext3 file systems, are prerequisites ...

Get Malware Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.