8. Find and understand every process

If at all possible, use statically-linked tools and utilities mounted from a CD-R for this investigation.

There are two or three easy ways to do this:

Any process which you do not recognise should be treated as suspicious — Google it; any differences in the results between the two (or three) sets of results should be treated with equal suspicion.

...previousup (conts)next...



About this document:

Produced from the SGML: /home/umits/public_html/_unix_security/_reml_grp/diagnostic_forensic_tools.reml
On: 23/10/2005 at 13:29:12
Options: reml2 -i noindex -l long -o html -p multiple