21%
30.01.2020
Apr 14 11:00 /boot/initramfs-3.10.0-957.el7.x86_64.img
Troubleshooting the Shell
If the system does not boot as usual and access to the root volume is not possible, dracut provides a shell
20%
05.12.2019
TIME CMD
Root 1 0 0 19:05 ? 00:00:00 sleep 1000
Listing 2
Process on the Host
$ ps -ef|grep sleep
Cherf 30328 29757 0 20:44 ? 00:00:00 sleep 1000
Cherf 30396 3353
20%
21.04.2015
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7
#
# ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs
/00/00
20%
28.03.2012
are on an IBM DTLA-307020 (20GB drive at Ultra ATA/100)
/home
is on a Seagate ST1360827AS
A 64GB Intel X-25E SSD, courtesy of Intel is mounted as /dev/sdd
ext4 filesystem with the default options
20%
23.03.2022
laytonjb laytonjb 4096 May 15 2020 darshan-3.2.1
31872599 -rw-rw-r-- 1 laytonjb laytonjb 3066907 Nov 20 2020 darshan-3.2.1.tar.gz
31992289 drwxrwxr-x 8 laytonjb laytonjb 4096 Jul 13
20%
11.02.2016
-backup /etc /mnt/backup
# rdiff-backup --list-increments /mnt/backup/
Found 2 increments:
increments.2015-03-15T09:15: 19+01:00.dir Sun Mar 15 09:15:19 2015
increments.2015-03-19T20:15: 46+01:00.dir Thu
20%
21.08.2012
-14.el6_3.x86_64.rpm | 2.2 MB 00:01
(3/4): php-common-5.3.3-14.el6_3.x86_64.rpm | 522 kB 00:00
(4/4): php-gd-5.3.3-14.el6_3.x86_64.rpm
20%
14.03.2013
(pr->pr_path), 0);
17 [...]
18 error = copyinstr(j.hostname,
19 &pr->pr_host, sizeof(pr->pr_host), 0);
20 [...]
21 pr->pr_ip = j.ip_number;
22 pr->pr_linux = NULL;
23 pr->pr_securelevel = securelevel
20%
09.08.2015
'
'/[Mm]an/p'
sed -n '/[Mm]an/p' textdata.txt
2
All lines except 3 through 5
'3,5!'
sed -n '3,5!'p textdata.txt
3
All lines except those containing 'Man
20%
11.06.2014
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility.
To begin, I review a raw memory dump of a known malware