In this lab, we’ll be investigating a possible malware infection on an Ubuntu Linux host. We’ll be looking for specific data points and will document them in a file on the host. Then we’ll export the syslog data to a text file for later analysis.
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Document data points provided by your supervisor.
- Open Gedit to provide a place to save your findings.
- Run the command
sudo top
to open the system performance interface. - Type the letter
P
to sort by processor utilization. Document the process using the most processor resources. - Type the letter
M
to sort by memory utilization. Document the process using the most memory resources. - Type
Ctrl+c
to exit top - Run the command
sudo df -h
to list out disk space statistics for the server. Identify the percentage of used disk space for/dev/xvda1
and record it. - Run the command
sudo w
to list active connections to the server. Identify the username of the active connection and record it. - Run the command
sudo netstat -a
and identify the ESTABLISHED connection. Record the remote IP address of the device connecting to the server. - From within Gedit, save the document on the Desktop as investigation.txt.
- Export syslog data to a file.
Run the following command:
sudo cat /var/log/syslog > /home/cloud_user/Desktop/syslog.txt