Notable reference site: Linux LEO, The Law Enforcement and Forensic Examiner’s Introduction to Linux. Please note, the guide has just received its first update in over a year. Updates should be coming more regularly, according to the guide’s author. Stay tuned for more to come!
Test data is available GPT Partition Image (gptimage.raw.gz), Fat File System Image (fat_fs.raw), “Able2” Ext2 Disk Image , able2.tar.gz), “Able3” Ext4 Disk Image (able_3.tar.gz), Practice Log Archive (logs.v3.tar.gz), Carve Image (image_carve_2017.raw), and NTFS Image (ntfs_Pract_2017_E01.tar.gz).
For information on file signature analysis (OS agnostic and file-type specific), please check out Gary Kessler’s File Signature Table.
See below for a list of Linux Tools.
Tool | Description |
---|---|
lLeapp | Linux Logs Events Application Program Parser |
UAC | UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts. |
Unix Collector | A shell script for basic forensic collection of various artifacts from UNIX systems. |
See below for a list of Linux Artifacts.