Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: SANS GIAC GSEC Audio Course

Episode 42 — Linux Incident Basics: Triage and Artifacts

22 Oct 2025

Description

When something goes wrong on a Linux system, knowing where to start determines how much truth you recover. This episode walks you through initial triage—stabilizing the system, identifying scope, and capturing volatile evidence before it disappears. You’ll learn how to inspect running processes, open network connections, recent logins, and loaded modules, all of which can reveal intrusion clues. The episode also emphasizes the importance of minimizing contamination—using write blockers, mounting drives read-only, and documenting every command to preserve evidentiary integrity.Listeners will then explore common artifacts that persist after an event, such as shell histories, cron jobs, temporary directories, and configuration files in /etc. We discuss how these traces help reconstruct attacker timelines and confirm persistence mechanisms. The goal is to make you comfortable with the investigative mindset: observe first, act second, and interpret data in context. By mastering these fundamentals, you’ll not only be ready for GSEC exam scenarios but also equipped to handle real-world incidents methodically and confidently. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.