This document discusses digital forensics and describes analyzing a compromised system. It explains that digital forensics involves examining disk, memory, and log files for evidence. The document provides examples of a crontab job downloading files weekly and log entries showing HTTP requests downloading files containing shell scripts that are then executed, indicating potential malware. It also lists files and directories on the system and their permissions.
Related topics: