From a forensics standpoint how much leftovers do package managers in Linux leave behind?

Let’s assume that for my question we’re using the equivalent of apt purge, which also removes configuration files. What’s left behind after apt purge and similar commands from other package managers?
I’m guessing it would be loose dependen… Continue reading From a forensics standpoint how much leftovers do package managers in Linux leave behind?

How might I rate-limit in nginx against a distributed attacker that has set the number of parallel connections in xerxes to 1?

An attacker tweaks xerxes by setting the number of CONNECTIONS in xerxes to 1 instead of 8, like so:
#define CONNECTIONS 1

They then attack with xerxes-executable mydomain 433.
Their strategy is to use eight time less connections from eac… Continue reading How might I rate-limit in nginx against a distributed attacker that has set the number of parallel connections in xerxes to 1?

Velociraptor & Loki

Velociraptor is a great DFIR tool that becomes more and more popular amongst Incident Handlers. Velociraptor works with agents that are deployed on endpoints. Once installed, the agent automatically “phones home” and keep s a connection with the server… exactly like a malware with it’s C2 server but this time

The post Velociraptor & Loki appeared first on /dev/random.

Continue reading Velociraptor & Loki

Does my jailbroken with root access iPad store any forensic evidence for usage of the lightning connector?

I am willing to give my iPad for a repair shop, but I would like to know whether they tamper with the OS in any way.

Is there any way with or without special software to gather forensic evidence about whether the lightning port was used t… Continue reading Does my jailbroken with root access iPad store any forensic evidence for usage of the lightning connector?