content update linux forensics
This commit is contained in:
		
							parent
							
								
									4d423eb403
								
							
						
					
					
						commit
						b8311e152d
					
				
							
								
								
									
										344586
									
								
								data/embeddings.json
									
									
									
									
									
								
							
							
						
						
									
										344586
									
								
								data/embeddings.json
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@ -6607,6 +6607,545 @@ tools:
 | 
			
		||||
    icon: 📧
 | 
			
		||||
    license: LGPL-3.0
 | 
			
		||||
    accessType: download
 | 
			
		||||
  - name: Linux Netzwerk-Konfiguration Analyse
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Systematische Auswertung von /etc/network/interfaces (Debian/Ubuntu), 
 | 
			
		||||
      /etc/sysconfig/network (SUSE), /etc/NetworkManager (WLAN) für 
 | 
			
		||||
      Netzwerk-Timeline-Reconstruction. Static/Dynamic-IP-Analysis, 
 | 
			
		||||
      Gateway-Configuration, WLAN-SSID-History und Interface-Status-Tracking.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - network-forensics
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - network-configuration
 | 
			
		||||
      - interface-analysis
 | 
			
		||||
      - wlan-analysis
 | 
			
		||||
      - ip-configuration
 | 
			
		||||
      - gateway-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Network Protocols & Packet Analysis
 | 
			
		||||
  - name: Linux File Access Timestamp Analyse
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Dateizugriffs-Rekonstruktion durch stat, ls -l, date -r für 
 | 
			
		||||
      Access/Modify/Change-Time-Analysis. Filesystem-Metadaten-Extraction, 
 | 
			
		||||
      Touch-Command-Detection, Root-Manipulation-Identification. Correlation 
 | 
			
		||||
      mit System-Logs für vollständige File-Activity-Timeline.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: beginner
 | 
			
		||||
    domains:
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - incident-response
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - file-timestamps
 | 
			
		||||
      - metadata-analysis
 | 
			
		||||
      - access-time
 | 
			
		||||
      - modification-time
 | 
			
		||||
      - filesystem-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - File Systems & Storage Forensics
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
  - name: Linux Package Management Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      APT/RPM-Paketmanager-Analyse für Software-Installation-Timeline und 
 | 
			
		||||
      Integrity-Verification. Repository-Source-Analysis, Package-History-
 | 
			
		||||
      Reconstruction, Dependency-Tracking, Malicious-Package-Detection durch 
 | 
			
		||||
      Signature-Verification und Update-Pattern-Analysis.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - package-analysis
 | 
			
		||||
      - software-timeline
 | 
			
		||||
      - installation-history
 | 
			
		||||
      - dependency-tracking
 | 
			
		||||
      - integrity-verification
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
  - name: Linux Namespace Container-Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Container-Isolation-Analysis durch Mount-, UTS-, IPC-, PID-, Network-, 
 | 
			
		||||
      User-Namespace-Examination. Unshare-Command-Analysis, Process-Container-
 | 
			
		||||
      Mapping, Resource-Limitation-Detection via /sys/fs/cgroup für 
 | 
			
		||||
      Container-Escape-Investigation und Privilege-Escalation-Detection.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: expert
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - container-analysis
 | 
			
		||||
      - namespace-isolation
 | 
			
		||||
      - privilege-escalation
 | 
			
		||||
      - process-isolation
 | 
			
		||||
      - container-escape
 | 
			
		||||
      - cgroup-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Memory Forensics & Process Analysis
 | 
			
		||||
  - name: Docker Container Forensische Analyse
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Docker-Image/Container-Layer-Analysis für Containerized-Application-
 | 
			
		||||
      Forensics. Dockerfile-Reconstruction, Image-History-Analysis, 
 | 
			
		||||
      Container-Runtime-Investigation, Volume-Mount-Analysis und 
 | 
			
		||||
      Network-Bridge-Examination für Container-Security-Incident-Response.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: advanced
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - cloud-forensics
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - container-forensics
 | 
			
		||||
      - docker-analysis
 | 
			
		||||
      - image-analysis
 | 
			
		||||
      - layer-analysis
 | 
			
		||||
      - volume-analysis
 | 
			
		||||
      - containerized-malware
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Memory Forensics & Process Analysis
 | 
			
		||||
    related_software:
 | 
			
		||||
      - Docker Explorer
 | 
			
		||||
  - name: Linux System Monitoring Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Live-System-Überwachung durch ps, top, htop für Process-Analysis und 
 | 
			
		||||
      Malware-Detection. SHA256-Hash-Verification von System-Binaries, 
 | 
			
		||||
      Update-Status-Verification, Hidden-Process-Detection und 
 | 
			
		||||
      Resource-Usage-Anomaly-Analysis für APT-Investigation.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - process-monitoring
 | 
			
		||||
      - hash-verification
 | 
			
		||||
      - malware-detection
 | 
			
		||||
      - system-integrity
 | 
			
		||||
      - anomaly-detection
 | 
			
		||||
      - apt-investigation
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
      - Memory Forensics & Process Analysis
 | 
			
		||||
    related_software:
 | 
			
		||||
      - hashdeep
 | 
			
		||||
      - md5sum / sha256sum
 | 
			
		||||
  - name: DNS Filtering Analysis (Linux)
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      /etc/hosts-File-Analysis für DNS-Manipulation-Detection und 
 | 
			
		||||
      Domain-Blocking-Investigation. Static-DNS-Entry-Analysis, 
 | 
			
		||||
      Malware-DNS-Hijacking-Detection, Sinkhole-Configuration-Analysis für 
 | 
			
		||||
      Network-Traffic-Redirection-Investigation und Anti-Malware-Verification.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: beginner
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - network-forensics
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - dns-analysis
 | 
			
		||||
      - hosts-file
 | 
			
		||||
      - domain-blocking
 | 
			
		||||
      - dns-hijacking
 | 
			
		||||
      - traffic-redirection
 | 
			
		||||
      - sinkhole-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Network Protocols & Packet Analysis
 | 
			
		||||
  - name: Linux Route Filtering Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Routing-Table-Analysis durch route-Command für Network-Traffic-Flow-
 | 
			
		||||
      Investigation. Static-Route-Configuration-Analysis, Gateway-Manipulation-
 | 
			
		||||
      Detection, Traffic-Filtering-Verification für Network-Isolation-Analysis 
 | 
			
		||||
      und Lateral-Movement-Investigation.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - network-forensics
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - routing-analysis
 | 
			
		||||
      - traffic-filtering
 | 
			
		||||
      - gateway-analysis
 | 
			
		||||
      - network-isolation
 | 
			
		||||
      - lateral-movement
 | 
			
		||||
      - route-manipulation
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Network Protocols & Packet Analysis
 | 
			
		||||
  - name: GnuPG Verschlüsselungs-Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      OpenPGP-Encryption-Analysis für verschlüsselte Kommunikation und 
 | 
			
		||||
      File-Protection-Investigation. Public/Private-Key-Analysis, 
 | 
			
		||||
      Signature-Verification, Encrypted-Message-Recovery-Techniques und 
 | 
			
		||||
      Key-Ring-Analysis für Cryptographic-Evidence-Processing.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: advanced
 | 
			
		||||
    domains:
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - incident-response
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - encryption-analysis
 | 
			
		||||
      - pgp-analysis
 | 
			
		||||
      - key-analysis
 | 
			
		||||
      - signature-verification
 | 
			
		||||
      - encrypted-communications
 | 
			
		||||
      - cryptographic-evidence
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
  - name: X.509 Certificate Analysis
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      SSL/TLS-Certificate-Forensik für HTTPS-Communication-Analysis und 
 | 
			
		||||
      PKI-Investigation. Certificate-Chain-Verification, CA-Trust-Analysis, 
 | 
			
		||||
      Certificate-Metadata-Extraction, Expired/Revoked-Certificate-Detection 
 | 
			
		||||
      für Network-Security-Incident-Analysis.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - network-forensics
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - certificate-analysis
 | 
			
		||||
      - ssl-tls-analysis
 | 
			
		||||
      - pki-analysis
 | 
			
		||||
      - trust-verification
 | 
			
		||||
      - network-security
 | 
			
		||||
      - https-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
      - Network Protocols & Packet Analysis
 | 
			
		||||
  - name: USB Device Forensic Analysis (Linux)
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      USB-Hardware-Forensik durch usbauth-Framework für Device-Access-Control-
 | 
			
		||||
      Analysis. USB-Device-History-Reconstruction, Vendor/Product-ID-Analysis, 
 | 
			
		||||
      Port-Binding-Investigation und Device-Type-Classification für 
 | 
			
		||||
      Hardware-Based-Attack-Investigation und Data-Exfiltration-Analysis.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - usb-forensics
 | 
			
		||||
      - hardware-analysis
 | 
			
		||||
      - device-history
 | 
			
		||||
      - access-control
 | 
			
		||||
      - data-exfiltration
 | 
			
		||||
      - hardware-attacks
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
  - name: Linux Live-Boot Forensik-Umgebung
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Kontaminationsfreie Systemuntersuchung durch Boot von USB/DVD ohne 
 | 
			
		||||
      Festplatten-Zugriff. Forensics-Mode deaktiviert automatisches Mounting 
 | 
			
		||||
      und Netzwerk-Services. Ermöglicht saubere Evidence-Akquisition ohne 
 | 
			
		||||
      Host-System-Veränderungen. Alle Änderungen sind nach Ausschalten gelöscht.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: beginner
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
    phases:
 | 
			
		||||
      - data-collection
 | 
			
		||||
      - examination
 | 
			
		||||
    tags:
 | 
			
		||||
      - live-acquisition
 | 
			
		||||
      - write-blocker
 | 
			
		||||
      - contamination-prevention
 | 
			
		||||
      - forensic-imaging
 | 
			
		||||
      - read-only-access
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Digital Evidence Chain of Custody
 | 
			
		||||
    related_software:
 | 
			
		||||
      - Kali Linux
 | 
			
		||||
      - SIFT Workstation
 | 
			
		||||
      - CAINE
 | 
			
		||||
  - name: Linux Festplatten-Partitionierung
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Systematische Datenträger-Aufteilung mit fdisk (MBR) oder gdisk (GPT)  für
 | 
			
		||||
      forensische Imaging-Workflows. Unterstützt DOS-, GPT-, SGI- und 
 | 
			
		||||
      Sun-Partitionierungen. Kombiniert mit mkfs für Dateisystem-Erstellung. 
 | 
			
		||||
      Essentiell für Evidence-Storage und Analyse-Partitionen.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
    phases:
 | 
			
		||||
      - data-collection
 | 
			
		||||
      - examination
 | 
			
		||||
    tags:
 | 
			
		||||
      - disk-partitioning
 | 
			
		||||
      - gpt-analysis
 | 
			
		||||
      - mbr-analysis
 | 
			
		||||
      - filesystem-creation
 | 
			
		||||
      - evidence-storage
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - File Systems & Storage Forensics
 | 
			
		||||
      - Digital Evidence Chain of Custody
 | 
			
		||||
    related_software:
 | 
			
		||||
      - dd
 | 
			
		||||
      - FTK Imager
 | 
			
		||||
  - name: Linux Benutzer- und Rechteverwaltung
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Systematische Analyse von /etc/passwd, /etc/shadow und /etc/group für 
 | 
			
		||||
      User-Activity-Reconstruction. Zahlencodierung (chmod 755) und 
 | 
			
		||||
      Symbolic-Notation (rwxr-xr-x) für Dateiberechtigungen. Includes setuid, 
 | 
			
		||||
      setgid und sticky-bit Analyse für Privilege-Escalation-Detection.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - user-analysis
 | 
			
		||||
      - permission-analysis
 | 
			
		||||
      - privilege-escalation
 | 
			
		||||
      - system-metadata
 | 
			
		||||
      - access-control
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - File Systems & Storage Forensics
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
    related_software:
 | 
			
		||||
      - grep
 | 
			
		||||
      - strings
 | 
			
		||||
  - name: Linux Log-Analyse Methodik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Strukturierte Auswertung von /var/log/* für
 | 
			
		||||
      Incident-Timeline-Reconstruction.  Unix-Time-Konvertierung,
 | 
			
		||||
      Kernel-Ring-Buffer-Analyse mit dmesg,  Authentication-Logs in
 | 
			
		||||
      auth.log/secure. Korrelation zwischen System-,  Kernel- und
 | 
			
		||||
      Application-Logs für vollständige Event-Sequencing.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - network-forensics
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - log-analysis
 | 
			
		||||
      - timeline-analysis
 | 
			
		||||
      - unix-time
 | 
			
		||||
      - kernel-analysis
 | 
			
		||||
      - authentication-logs
 | 
			
		||||
      - syslog-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
    related_software:
 | 
			
		||||
      - grep
 | 
			
		||||
      - Plaso (log2timeline)
 | 
			
		||||
  - name: Linux Shell-Historie Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Bash-History-Analyse aus ~/.bash_history für Command-Execution-Timeline. 
 | 
			
		||||
      Erkennung von Anti-Forensik-Techniken: geleerte History, Softlinks auf 
 | 
			
		||||
      /dev/null, manipulierte Timestamps. Korrelation mit Login-Logs für 
 | 
			
		||||
      vollständige User-Activity-Reconstruction ohne Zeitstempel.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - command-history
 | 
			
		||||
      - user-activity
 | 
			
		||||
      - anti-forensics-detection
 | 
			
		||||
      - bash-analysis
 | 
			
		||||
      - timeline-reconstruction
 | 
			
		||||
      - indicator-of-compromise
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
    related_software:
 | 
			
		||||
      - grep
 | 
			
		||||
      - strings
 | 
			
		||||
  - name: Git Repository Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Versionskontroll-System-Analyse für Source-Code-Forensik und 
 | 
			
		||||
      Entwickler-Activity-Tracking. Branch-Timeline-Reconstruction, 
 | 
			
		||||
      Commit-Hash-Verifizierung, Merge-Conflict-Analysis. Collaborative-
 | 
			
		||||
      Workflow-Investigation über Remote-Repositories und Pull-Requests.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: advanced
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - version-control
 | 
			
		||||
      - source-code-analysis
 | 
			
		||||
      - developer-tracking
 | 
			
		||||
      - commit-analysis
 | 
			
		||||
      - collaboration-forensics
 | 
			
		||||
      - hash-verification
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
      - Timeline Analysis & Event Correlation
 | 
			
		||||
    related_software:
 | 
			
		||||
      - Gitea
 | 
			
		||||
  - name: iptables Firewall-Forensik
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Netzwerk-Traffic-Filtering-Analysis durch iptables-Rules-Reconstruction. 
 | 
			
		||||
      INPUT/OUTPUT/FORWARD-Chain-Analysis, ACCEPT/DROP/REJECT-Actions, 
 | 
			
		||||
      Port-based und IP-based Filtering. Regel-Persistence-Verification und 
 | 
			
		||||
      Anti-Evasion-Configuration für Incident-Response.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: advanced
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - network-forensics
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - firewall-analysis
 | 
			
		||||
      - network-filtering
 | 
			
		||||
      - traffic-analysis
 | 
			
		||||
      - rule-analysis
 | 
			
		||||
      - packet-filtering
 | 
			
		||||
      - network-security
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Network Protocols & Packet Analysis
 | 
			
		||||
  - name: LUKS Disk-Encryption Analysis
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Linux Unified Key Setup Verschlüsselungs-Forensik für encrypted 
 | 
			
		||||
      Partitions und Container. Cryptsetup-based Key-Slot-Analysis, 
 | 
			
		||||
      Metadata-Header-Examination, Passphrase-Recovery-Techniques.  Integration
 | 
			
		||||
      mit Filesystem-Mounting für decrypted Evidence-Access.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: expert
 | 
			
		||||
    domains:
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - incident-response
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - disk-encryption
 | 
			
		||||
      - key-analysis
 | 
			
		||||
      - encrypted-storage
 | 
			
		||||
      - partition-analysis
 | 
			
		||||
      - cryptographic-analysis
 | 
			
		||||
      - access-recovery
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Hash Functions & Digital Signatures
 | 
			
		||||
      - File Systems & Storage Forensics
 | 
			
		||||
  - name: Linux Secure File Deletion Verification
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Forensische Verifikation sicherer Löschvorgänge durch Overwrite-Pattern-
 | 
			
		||||
      Analysis. Unterscheidung zwischen rm (Filesystem-Entry-Deletion) und 
 | 
			
		||||
      shred (Multi-Pass-Overwriting). Recovery-Verification und Anti-Forensik-
 | 
			
		||||
      Detection bei unvollständigen Secure-Wipe-Operationen.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: intermediate
 | 
			
		||||
    domains:
 | 
			
		||||
      - static-investigations
 | 
			
		||||
      - incident-response
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - secure-deletion
 | 
			
		||||
      - data-recovery
 | 
			
		||||
      - overwrite-analysis
 | 
			
		||||
      - anti-forensics
 | 
			
		||||
      - file-system-analysis
 | 
			
		||||
      - data-sanitization
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - File Systems & Storage Forensics
 | 
			
		||||
    related_software:
 | 
			
		||||
      - PhotoRec
 | 
			
		||||
      - dd
 | 
			
		||||
  - name: Linux Process Memory Analysis
 | 
			
		||||
    type: method
 | 
			
		||||
    description: >-
 | 
			
		||||
      Live-System-Speicher-Untersuchung durch /proc-Filesystem-Analysis. 
 | 
			
		||||
      Process-State-Examination, Memory-Maps-Analysis, Open-Files-Detection  via
 | 
			
		||||
      /proc/PID/. Kernel-Module-Verification und Hidden-Process-Detection  für
 | 
			
		||||
      Rootkit-Analysis ohne Memory-Dump-Tools.
 | 
			
		||||
    url: https://cloud.cc24.dev/f/32342
 | 
			
		||||
    skillLevel: advanced
 | 
			
		||||
    domains:
 | 
			
		||||
      - incident-response
 | 
			
		||||
      - malware-analysis
 | 
			
		||||
    phases:
 | 
			
		||||
      - examination
 | 
			
		||||
      - analysis
 | 
			
		||||
    tags:
 | 
			
		||||
      - process-analysis
 | 
			
		||||
      - memory-analysis
 | 
			
		||||
      - proc-filesystem
 | 
			
		||||
      - rootkit-detection
 | 
			
		||||
      - live-analysis
 | 
			
		||||
      - kernel-analysis
 | 
			
		||||
    related_concepts:
 | 
			
		||||
      - Memory Forensics & Process Analysis
 | 
			
		||||
domains:
 | 
			
		||||
  - id: incident-response
 | 
			
		||||
    name: Incident Response & Breach-Untersuchung
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user