Set 8
71. Forensic Analysis – Extract Authentication Failures
Scenario Security team is investigating repeated authentication failures during a suspected breach.
Instructions:
Navigate to
~/kactii29Create folder
auth_failuresAssume
auth.logexistsExtract lines containing
FAILSave output to
auth_fail.log
Commands Expected:
grep, output redirection
72. Storage Evidence – Disk Usage Snapshot
Scenario Forensic investigators need a point-in-time snapshot of disk usage for evidence.
Instructions:
Navigate to
~/kactii29Create
disk_evidenceMeasure directory disk usage
Display in human-readable format
Save output to
disk_evidence.txt
Commands Expected:
du -h
73. User Activity Evidence – Logged-In Users
Scenario Investigation requires identifying which users were logged in at a specific time.
Instructions:
Navigate to
~/kactii29Create
user_activity_evidenceCapture logged-in users
Append current date and time
Save to
user_activity.log
Commands Expected:
who, date, output redirection
74. Tool Integrity – Verify Forensic Utilities
Scenario Before evidence collection, analysts must confirm required utilities exist.
Instructions:
Navigate to
~/kactii29Create
tool_integrityLocate paths for
grep,du, anduptimeSave output to
tools_verified.txt
Commands Expected:
which
75. Service Traceability – Scheduler Service Status
Scenario Investigators need to verify whether scheduled tasks could have executed.
Instructions:
Navigate to
~/kactii29Create
scheduler_traceCheck cron service status
Start service if inactive
Save output to
scheduler_status.txt
Commands Expected:
systemctl status, systemctl start
76. Deferred Execution Trace – Scheduled Job Listing
Scenario Forensic review requires a list of all deferred one-time jobs.
Instructions:
Navigate to
~/kactii29Create
deferred_traceList all scheduled
atjobsSave output to
deferred_trace.txt
Commands Expected:
atq
77. Runtime State Capture – Environment Variables
Scenario Application behavior must be reconstructed using runtime environment data.
Instructions:
Navigate to
~/kactii29Create
runtime_stateDisplay all environment variables
Save output to
runtime_state.txt
Commands Expected:
printenv
78. Network Forensics – Listening Port Snapshot
Scenario Security team needs a snapshot of exposed listening ports during investigation.
Instructions:
Navigate to
~/kactii29Create
network_forensicsCapture all listening TCP and UDP sockets
Save output to
listening_ports.txt
Commands Expected:
ss -tuln
79. Evidence Normalization – Unique Sorted Indicators
Scenario Investigators need a normalized list of unique indicators from raw data.
Instructions:
Navigate to
~/kactii29Create
indicator_normalizationAssume
indicators.logexistsSort and remove duplicate entries
Save to
unique_indicators.txt
Commands Expected:
sort, uniq
80. Timeline Evidence – System Uptime Record
Scenario Incident timeline reconstruction requires uptime evidence.
Instructions:
Navigate to
~/kactii29Create
timeline_evidenceCapture system uptime
Append timestamp
Save to
timeline_uptime.log
Commands Expected:
uptime, date, output redirection
Last updated