Chapter 5
Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Solutions in this chapter:
Malware Discovery and Extraction from a Linux System
Using Linux as a Forensic Platform
Introduction
An in-depth forensic examination of a Linux system can answer important questions about a malware incident, including how malware was placed on the system, what it did, and what remote systems were involved.
A working knowledge of Linux, and a familiarity with the ext2 and ext3 file systems, are prerequisites ...
Get Malware Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.