
Joseph Moronwi
@joseffmoronwi
Computer programmer and cyber-security enthusiast
ID: 1206107621499047936
https://digitalinvestigator.blogspot.com 15-12-2019 07:04:44
61 Tweet
37 Followers
63 Following





This post examines a compromised Linux web server to determine how the adversary gained entry and the exploits used. The image analysed was provided by Ali Hadi | B!n@ry at the 2019 OSDFCon digitalinvestigator.blogspot.com/2023/09/linux-ā¦



In this article, I examined a HDFS cluster breach case provided by Ali Hadi | B!n@ry using Tsurugi Linux, the sharpest weapon in your DFIR arsenal. digitalinvestigator.blogspot.com/2023/09/linux-ā¦





A post on hunting C2 beaconing with open-source tools using Tsurugi Linux digitalinvestigator.blogspot.com/2024/01/huntinā¦





Dive into this post for a comprehensive guide to Linux log forensics. Perfect for investigators, sysadmins, and tech enthusiasts! š”ļø Read it here: digitalinvestigator.blogspot.com/2024/11/analyz⦠Linux forensic image provided by Ali Hadi | B!n@ry, and forensic tool is Tsurugi Linux.

