Learn how to analyze a Linux system after a compromise — reconstruct the timeline, identify abnormal processes and connections, detect traces on disk, and uncover typical persistence mechanisms.
Locked lesson
This lesson is reserved for members. Upgrade to unlock the full course.