linux_shortcuts2 Flashcards

CHFI certificate

1
Q

chkrootkit

A

Check security settings of the system for anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

daemon.lof

A

running services, such as squid and ntpd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dd

A

command helps create backups and restore MBR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

dd command

A

In UNIX/Linux, the dd command helps create backups and restore MBR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

df

A

command helps determine amount of disk space used and free disk space on the mounted qewfile systems on a Linux system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

df

A

command retrieves data pertaining to the amount of disk space used and free disk space on the mounted systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

dmesg

A

Displays kernel ring buffers or information about device drivers loaded into the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dpkg.log

A

Package installation or removal logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

fls/fls -i

A

command to list the files and directories available in an image file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

history

A

Lists the Bash’s log of the typed commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hostname

A

command to view the current system name and DNS of a Linux machine, can also be useful while examining logs and network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ifconfig

A

This tool is used to check if a network interface has been set to promiscuous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

istat

A

Use istat command to display the metadata of a file, such as MAC times, file size, and file access permissions, by specifying a particular inode number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

kern.log

A

Initialization of kernels, kernel errors or informational messages sent from the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

last

A

Investigators should also check the contents of the /var/log/wtmp file to pull out information regarding system boot time, user login history etc. They can use the last command to view user login history and other related details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LiME

A

Tool used in the acquisition of RAM dumps in a Linux machine.

17
Q

lpr.log

A

printer logs

18
Q

lsmod

A

command to determine the status of modules loaded in the Linux Kernel.

19
Q

lsof

A

List open files, retrieves info on all active processes

20
Q

mmls

A

The Sleuth Kit command can help investigators view the detailed partition layout for the GPT disk, along with the MBR details.

21
Q

mount

A

command displays information related to the mounted file systems on Linux

22
Q

nbtscan

A

is a program for scanning IP networks for Net BIOS name information. Sens a Net BIOS status query to each address in the supplied range and lists the received information in a m human0readable form

23
Q

nc -l

A

Netcat tool for guiding local machine to start listening to TCP connections.

24
Q

netstat -p

A

Lists PID/Program name

25
Q

netstat

A

A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports.

26
Q

nmap -sT localhost

A

To identify TCP ports that are open and obtain information on them.

27
Q

nmap -sU localhost

A

To identify UDP ports that are open and obtain information on them.

28
Q

Portable Document Format (PDF)

A

files can also contain metadata such as name of the author, the date when file was created

29
Q

Prefetch

A

When a user installs an application, runs it, and deletes it, traces of that application can be found in this directory

30
Q

PsList

A

displays basic information about the already running processes on a system, including the amount of time each process has been running (in both kernel and user modes).

31
Q

rkhunter

A

command lists hidden directories or suspicious file types under /dev directory.

32
Q

RP.log Files

A

file located within the restore point (RPxx) directory

33
Q

wtmp log file

A

command pulls the login history from the _____________ file.