content update linux forensics
This commit is contained in:
		
							parent
							
								
									4d423eb403
								
							
						
					
					
						commit
						b8311e152d
					
				
							
								
								
									
										344586
									
								
								data/embeddings.json
									
									
									
									
									
								
							
							
						
						
									
										344586
									
								
								data/embeddings.json
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@ -6607,6 +6607,545 @@ tools:
 | 
				
			|||||||
    icon: 📧
 | 
					    icon: 📧
 | 
				
			||||||
    license: LGPL-3.0
 | 
					    license: LGPL-3.0
 | 
				
			||||||
    accessType: download
 | 
					    accessType: download
 | 
				
			||||||
 | 
					  - name: Linux Netzwerk-Konfiguration Analyse
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Systematische Auswertung von /etc/network/interfaces (Debian/Ubuntu), 
 | 
				
			||||||
 | 
					      /etc/sysconfig/network (SUSE), /etc/NetworkManager (WLAN) für 
 | 
				
			||||||
 | 
					      Netzwerk-Timeline-Reconstruction. Static/Dynamic-IP-Analysis, 
 | 
				
			||||||
 | 
					      Gateway-Configuration, WLAN-SSID-History und Interface-Status-Tracking.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - network-configuration
 | 
				
			||||||
 | 
					      - interface-analysis
 | 
				
			||||||
 | 
					      - wlan-analysis
 | 
				
			||||||
 | 
					      - ip-configuration
 | 
				
			||||||
 | 
					      - gateway-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Network Protocols & Packet Analysis
 | 
				
			||||||
 | 
					  - name: Linux File Access Timestamp Analyse
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Dateizugriffs-Rekonstruktion durch stat, ls -l, date -r für 
 | 
				
			||||||
 | 
					      Access/Modify/Change-Time-Analysis. Filesystem-Metadaten-Extraction, 
 | 
				
			||||||
 | 
					      Touch-Command-Detection, Root-Manipulation-Identification. Correlation 
 | 
				
			||||||
 | 
					      mit System-Logs für vollständige File-Activity-Timeline.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: beginner
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - file-timestamps
 | 
				
			||||||
 | 
					      - metadata-analysis
 | 
				
			||||||
 | 
					      - access-time
 | 
				
			||||||
 | 
					      - modification-time
 | 
				
			||||||
 | 
					      - filesystem-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - File Systems & Storage Forensics
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					  - name: Linux Package Management Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      APT/RPM-Paketmanager-Analyse für Software-Installation-Timeline und 
 | 
				
			||||||
 | 
					      Integrity-Verification. Repository-Source-Analysis, Package-History-
 | 
				
			||||||
 | 
					      Reconstruction, Dependency-Tracking, Malicious-Package-Detection durch 
 | 
				
			||||||
 | 
					      Signature-Verification und Update-Pattern-Analysis.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - package-analysis
 | 
				
			||||||
 | 
					      - software-timeline
 | 
				
			||||||
 | 
					      - installation-history
 | 
				
			||||||
 | 
					      - dependency-tracking
 | 
				
			||||||
 | 
					      - integrity-verification
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					  - name: Linux Namespace Container-Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Container-Isolation-Analysis durch Mount-, UTS-, IPC-, PID-, Network-, 
 | 
				
			||||||
 | 
					      User-Namespace-Examination. Unshare-Command-Analysis, Process-Container-
 | 
				
			||||||
 | 
					      Mapping, Resource-Limitation-Detection via /sys/fs/cgroup für 
 | 
				
			||||||
 | 
					      Container-Escape-Investigation und Privilege-Escalation-Detection.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: expert
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - container-analysis
 | 
				
			||||||
 | 
					      - namespace-isolation
 | 
				
			||||||
 | 
					      - privilege-escalation
 | 
				
			||||||
 | 
					      - process-isolation
 | 
				
			||||||
 | 
					      - container-escape
 | 
				
			||||||
 | 
					      - cgroup-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Memory Forensics & Process Analysis
 | 
				
			||||||
 | 
					  - name: Docker Container Forensische Analyse
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Docker-Image/Container-Layer-Analysis für Containerized-Application-
 | 
				
			||||||
 | 
					      Forensics. Dockerfile-Reconstruction, Image-History-Analysis, 
 | 
				
			||||||
 | 
					      Container-Runtime-Investigation, Volume-Mount-Analysis und 
 | 
				
			||||||
 | 
					      Network-Bridge-Examination für Container-Security-Incident-Response.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: advanced
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - cloud-forensics
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - container-forensics
 | 
				
			||||||
 | 
					      - docker-analysis
 | 
				
			||||||
 | 
					      - image-analysis
 | 
				
			||||||
 | 
					      - layer-analysis
 | 
				
			||||||
 | 
					      - volume-analysis
 | 
				
			||||||
 | 
					      - containerized-malware
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Memory Forensics & Process Analysis
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - Docker Explorer
 | 
				
			||||||
 | 
					  - name: Linux System Monitoring Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Live-System-Überwachung durch ps, top, htop für Process-Analysis und 
 | 
				
			||||||
 | 
					      Malware-Detection. SHA256-Hash-Verification von System-Binaries, 
 | 
				
			||||||
 | 
					      Update-Status-Verification, Hidden-Process-Detection und 
 | 
				
			||||||
 | 
					      Resource-Usage-Anomaly-Analysis für APT-Investigation.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - process-monitoring
 | 
				
			||||||
 | 
					      - hash-verification
 | 
				
			||||||
 | 
					      - malware-detection
 | 
				
			||||||
 | 
					      - system-integrity
 | 
				
			||||||
 | 
					      - anomaly-detection
 | 
				
			||||||
 | 
					      - apt-investigation
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					      - Memory Forensics & Process Analysis
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - hashdeep
 | 
				
			||||||
 | 
					      - md5sum / sha256sum
 | 
				
			||||||
 | 
					  - name: DNS Filtering Analysis (Linux)
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      /etc/hosts-File-Analysis für DNS-Manipulation-Detection und 
 | 
				
			||||||
 | 
					      Domain-Blocking-Investigation. Static-DNS-Entry-Analysis, 
 | 
				
			||||||
 | 
					      Malware-DNS-Hijacking-Detection, Sinkhole-Configuration-Analysis für 
 | 
				
			||||||
 | 
					      Network-Traffic-Redirection-Investigation und Anti-Malware-Verification.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: beginner
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - dns-analysis
 | 
				
			||||||
 | 
					      - hosts-file
 | 
				
			||||||
 | 
					      - domain-blocking
 | 
				
			||||||
 | 
					      - dns-hijacking
 | 
				
			||||||
 | 
					      - traffic-redirection
 | 
				
			||||||
 | 
					      - sinkhole-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Network Protocols & Packet Analysis
 | 
				
			||||||
 | 
					  - name: Linux Route Filtering Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Routing-Table-Analysis durch route-Command für Network-Traffic-Flow-
 | 
				
			||||||
 | 
					      Investigation. Static-Route-Configuration-Analysis, Gateway-Manipulation-
 | 
				
			||||||
 | 
					      Detection, Traffic-Filtering-Verification für Network-Isolation-Analysis 
 | 
				
			||||||
 | 
					      und Lateral-Movement-Investigation.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - routing-analysis
 | 
				
			||||||
 | 
					      - traffic-filtering
 | 
				
			||||||
 | 
					      - gateway-analysis
 | 
				
			||||||
 | 
					      - network-isolation
 | 
				
			||||||
 | 
					      - lateral-movement
 | 
				
			||||||
 | 
					      - route-manipulation
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Network Protocols & Packet Analysis
 | 
				
			||||||
 | 
					  - name: GnuPG Verschlüsselungs-Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      OpenPGP-Encryption-Analysis für verschlüsselte Kommunikation und 
 | 
				
			||||||
 | 
					      File-Protection-Investigation. Public/Private-Key-Analysis, 
 | 
				
			||||||
 | 
					      Signature-Verification, Encrypted-Message-Recovery-Techniques und 
 | 
				
			||||||
 | 
					      Key-Ring-Analysis für Cryptographic-Evidence-Processing.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: advanced
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - encryption-analysis
 | 
				
			||||||
 | 
					      - pgp-analysis
 | 
				
			||||||
 | 
					      - key-analysis
 | 
				
			||||||
 | 
					      - signature-verification
 | 
				
			||||||
 | 
					      - encrypted-communications
 | 
				
			||||||
 | 
					      - cryptographic-evidence
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					  - name: X.509 Certificate Analysis
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      SSL/TLS-Certificate-Forensik für HTTPS-Communication-Analysis und 
 | 
				
			||||||
 | 
					      PKI-Investigation. Certificate-Chain-Verification, CA-Trust-Analysis, 
 | 
				
			||||||
 | 
					      Certificate-Metadata-Extraction, Expired/Revoked-Certificate-Detection 
 | 
				
			||||||
 | 
					      für Network-Security-Incident-Analysis.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - certificate-analysis
 | 
				
			||||||
 | 
					      - ssl-tls-analysis
 | 
				
			||||||
 | 
					      - pki-analysis
 | 
				
			||||||
 | 
					      - trust-verification
 | 
				
			||||||
 | 
					      - network-security
 | 
				
			||||||
 | 
					      - https-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					      - Network Protocols & Packet Analysis
 | 
				
			||||||
 | 
					  - name: USB Device Forensic Analysis (Linux)
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      USB-Hardware-Forensik durch usbauth-Framework für Device-Access-Control-
 | 
				
			||||||
 | 
					      Analysis. USB-Device-History-Reconstruction, Vendor/Product-ID-Analysis, 
 | 
				
			||||||
 | 
					      Port-Binding-Investigation und Device-Type-Classification für 
 | 
				
			||||||
 | 
					      Hardware-Based-Attack-Investigation und Data-Exfiltration-Analysis.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - usb-forensics
 | 
				
			||||||
 | 
					      - hardware-analysis
 | 
				
			||||||
 | 
					      - device-history
 | 
				
			||||||
 | 
					      - access-control
 | 
				
			||||||
 | 
					      - data-exfiltration
 | 
				
			||||||
 | 
					      - hardware-attacks
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					  - name: Linux Live-Boot Forensik-Umgebung
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Kontaminationsfreie Systemuntersuchung durch Boot von USB/DVD ohne 
 | 
				
			||||||
 | 
					      Festplatten-Zugriff. Forensics-Mode deaktiviert automatisches Mounting 
 | 
				
			||||||
 | 
					      und Netzwerk-Services. Ermöglicht saubere Evidence-Akquisition ohne 
 | 
				
			||||||
 | 
					      Host-System-Veränderungen. Alle Änderungen sind nach Ausschalten gelöscht.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: beginner
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - data-collection
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - live-acquisition
 | 
				
			||||||
 | 
					      - write-blocker
 | 
				
			||||||
 | 
					      - contamination-prevention
 | 
				
			||||||
 | 
					      - forensic-imaging
 | 
				
			||||||
 | 
					      - read-only-access
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Digital Evidence Chain of Custody
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - Kali Linux
 | 
				
			||||||
 | 
					      - SIFT Workstation
 | 
				
			||||||
 | 
					      - CAINE
 | 
				
			||||||
 | 
					  - name: Linux Festplatten-Partitionierung
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Systematische Datenträger-Aufteilung mit fdisk (MBR) oder gdisk (GPT)  für
 | 
				
			||||||
 | 
					      forensische Imaging-Workflows. Unterstützt DOS-, GPT-, SGI- und 
 | 
				
			||||||
 | 
					      Sun-Partitionierungen. Kombiniert mit mkfs für Dateisystem-Erstellung. 
 | 
				
			||||||
 | 
					      Essentiell für Evidence-Storage und Analyse-Partitionen.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - data-collection
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - disk-partitioning
 | 
				
			||||||
 | 
					      - gpt-analysis
 | 
				
			||||||
 | 
					      - mbr-analysis
 | 
				
			||||||
 | 
					      - filesystem-creation
 | 
				
			||||||
 | 
					      - evidence-storage
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - File Systems & Storage Forensics
 | 
				
			||||||
 | 
					      - Digital Evidence Chain of Custody
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - dd
 | 
				
			||||||
 | 
					      - FTK Imager
 | 
				
			||||||
 | 
					  - name: Linux Benutzer- und Rechteverwaltung
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Systematische Analyse von /etc/passwd, /etc/shadow und /etc/group für 
 | 
				
			||||||
 | 
					      User-Activity-Reconstruction. Zahlencodierung (chmod 755) und 
 | 
				
			||||||
 | 
					      Symbolic-Notation (rwxr-xr-x) für Dateiberechtigungen. Includes setuid, 
 | 
				
			||||||
 | 
					      setgid und sticky-bit Analyse für Privilege-Escalation-Detection.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - user-analysis
 | 
				
			||||||
 | 
					      - permission-analysis
 | 
				
			||||||
 | 
					      - privilege-escalation
 | 
				
			||||||
 | 
					      - system-metadata
 | 
				
			||||||
 | 
					      - access-control
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - File Systems & Storage Forensics
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - grep
 | 
				
			||||||
 | 
					      - strings
 | 
				
			||||||
 | 
					  - name: Linux Log-Analyse Methodik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Strukturierte Auswertung von /var/log/* für
 | 
				
			||||||
 | 
					      Incident-Timeline-Reconstruction.  Unix-Time-Konvertierung,
 | 
				
			||||||
 | 
					      Kernel-Ring-Buffer-Analyse mit dmesg,  Authentication-Logs in
 | 
				
			||||||
 | 
					      auth.log/secure. Korrelation zwischen System-,  Kernel- und
 | 
				
			||||||
 | 
					      Application-Logs für vollständige Event-Sequencing.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - log-analysis
 | 
				
			||||||
 | 
					      - timeline-analysis
 | 
				
			||||||
 | 
					      - unix-time
 | 
				
			||||||
 | 
					      - kernel-analysis
 | 
				
			||||||
 | 
					      - authentication-logs
 | 
				
			||||||
 | 
					      - syslog-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - grep
 | 
				
			||||||
 | 
					      - Plaso (log2timeline)
 | 
				
			||||||
 | 
					  - name: Linux Shell-Historie Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Bash-History-Analyse aus ~/.bash_history für Command-Execution-Timeline. 
 | 
				
			||||||
 | 
					      Erkennung von Anti-Forensik-Techniken: geleerte History, Softlinks auf 
 | 
				
			||||||
 | 
					      /dev/null, manipulierte Timestamps. Korrelation mit Login-Logs für 
 | 
				
			||||||
 | 
					      vollständige User-Activity-Reconstruction ohne Zeitstempel.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - command-history
 | 
				
			||||||
 | 
					      - user-activity
 | 
				
			||||||
 | 
					      - anti-forensics-detection
 | 
				
			||||||
 | 
					      - bash-analysis
 | 
				
			||||||
 | 
					      - timeline-reconstruction
 | 
				
			||||||
 | 
					      - indicator-of-compromise
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - grep
 | 
				
			||||||
 | 
					      - strings
 | 
				
			||||||
 | 
					  - name: Git Repository Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Versionskontroll-System-Analyse für Source-Code-Forensik und 
 | 
				
			||||||
 | 
					      Entwickler-Activity-Tracking. Branch-Timeline-Reconstruction, 
 | 
				
			||||||
 | 
					      Commit-Hash-Verifizierung, Merge-Conflict-Analysis. Collaborative-
 | 
				
			||||||
 | 
					      Workflow-Investigation über Remote-Repositories und Pull-Requests.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: advanced
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - version-control
 | 
				
			||||||
 | 
					      - source-code-analysis
 | 
				
			||||||
 | 
					      - developer-tracking
 | 
				
			||||||
 | 
					      - commit-analysis
 | 
				
			||||||
 | 
					      - collaboration-forensics
 | 
				
			||||||
 | 
					      - hash-verification
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					      - Timeline Analysis & Event Correlation
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - Gitea
 | 
				
			||||||
 | 
					  - name: iptables Firewall-Forensik
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Netzwerk-Traffic-Filtering-Analysis durch iptables-Rules-Reconstruction. 
 | 
				
			||||||
 | 
					      INPUT/OUTPUT/FORWARD-Chain-Analysis, ACCEPT/DROP/REJECT-Actions, 
 | 
				
			||||||
 | 
					      Port-based und IP-based Filtering. Regel-Persistence-Verification und 
 | 
				
			||||||
 | 
					      Anti-Evasion-Configuration für Incident-Response.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: advanced
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - network-forensics
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - firewall-analysis
 | 
				
			||||||
 | 
					      - network-filtering
 | 
				
			||||||
 | 
					      - traffic-analysis
 | 
				
			||||||
 | 
					      - rule-analysis
 | 
				
			||||||
 | 
					      - packet-filtering
 | 
				
			||||||
 | 
					      - network-security
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Network Protocols & Packet Analysis
 | 
				
			||||||
 | 
					  - name: LUKS Disk-Encryption Analysis
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Linux Unified Key Setup Verschlüsselungs-Forensik für encrypted 
 | 
				
			||||||
 | 
					      Partitions und Container. Cryptsetup-based Key-Slot-Analysis, 
 | 
				
			||||||
 | 
					      Metadata-Header-Examination, Passphrase-Recovery-Techniques.  Integration
 | 
				
			||||||
 | 
					      mit Filesystem-Mounting für decrypted Evidence-Access.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: expert
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - disk-encryption
 | 
				
			||||||
 | 
					      - key-analysis
 | 
				
			||||||
 | 
					      - encrypted-storage
 | 
				
			||||||
 | 
					      - partition-analysis
 | 
				
			||||||
 | 
					      - cryptographic-analysis
 | 
				
			||||||
 | 
					      - access-recovery
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Hash Functions & Digital Signatures
 | 
				
			||||||
 | 
					      - File Systems & Storage Forensics
 | 
				
			||||||
 | 
					  - name: Linux Secure File Deletion Verification
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Forensische Verifikation sicherer Löschvorgänge durch Overwrite-Pattern-
 | 
				
			||||||
 | 
					      Analysis. Unterscheidung zwischen rm (Filesystem-Entry-Deletion) und 
 | 
				
			||||||
 | 
					      shred (Multi-Pass-Overwriting). Recovery-Verification und Anti-Forensik-
 | 
				
			||||||
 | 
					      Detection bei unvollständigen Secure-Wipe-Operationen.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: intermediate
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - static-investigations
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - secure-deletion
 | 
				
			||||||
 | 
					      - data-recovery
 | 
				
			||||||
 | 
					      - overwrite-analysis
 | 
				
			||||||
 | 
					      - anti-forensics
 | 
				
			||||||
 | 
					      - file-system-analysis
 | 
				
			||||||
 | 
					      - data-sanitization
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - File Systems & Storage Forensics
 | 
				
			||||||
 | 
					    related_software:
 | 
				
			||||||
 | 
					      - PhotoRec
 | 
				
			||||||
 | 
					      - dd
 | 
				
			||||||
 | 
					  - name: Linux Process Memory Analysis
 | 
				
			||||||
 | 
					    type: method
 | 
				
			||||||
 | 
					    description: >-
 | 
				
			||||||
 | 
					      Live-System-Speicher-Untersuchung durch /proc-Filesystem-Analysis. 
 | 
				
			||||||
 | 
					      Process-State-Examination, Memory-Maps-Analysis, Open-Files-Detection  via
 | 
				
			||||||
 | 
					      /proc/PID/. Kernel-Module-Verification und Hidden-Process-Detection  für
 | 
				
			||||||
 | 
					      Rootkit-Analysis ohne Memory-Dump-Tools.
 | 
				
			||||||
 | 
					    url: https://cloud.cc24.dev/f/32342
 | 
				
			||||||
 | 
					    skillLevel: advanced
 | 
				
			||||||
 | 
					    domains:
 | 
				
			||||||
 | 
					      - incident-response
 | 
				
			||||||
 | 
					      - malware-analysis
 | 
				
			||||||
 | 
					    phases:
 | 
				
			||||||
 | 
					      - examination
 | 
				
			||||||
 | 
					      - analysis
 | 
				
			||||||
 | 
					    tags:
 | 
				
			||||||
 | 
					      - process-analysis
 | 
				
			||||||
 | 
					      - memory-analysis
 | 
				
			||||||
 | 
					      - proc-filesystem
 | 
				
			||||||
 | 
					      - rootkit-detection
 | 
				
			||||||
 | 
					      - live-analysis
 | 
				
			||||||
 | 
					      - kernel-analysis
 | 
				
			||||||
 | 
					    related_concepts:
 | 
				
			||||||
 | 
					      - Memory Forensics & Process Analysis
 | 
				
			||||||
domains:
 | 
					domains:
 | 
				
			||||||
  - id: incident-response
 | 
					  - id: incident-response
 | 
				
			||||||
    name: Incident Response & Breach-Untersuchung
 | 
					    name: Incident Response & Breach-Untersuchung
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user