You are conducting a security investigation of malicious activity that took place on the target Linux or one workstation. As part of your investigation, you would like to send a log file from the system to your instructor to get advice on interpreting logging attempts. D authentication log stored in the /var/log/auth.log file. Log into the TargetLinux01 system Using the student accounts, a copy of the file and encrypt it using AES encryption So that's only Matthew hunter can read the file. Make a screen capture showing the commands used to encrypt and copy the file Next, copy the file to the instructor account and decrypt it there make a screen capture showing the commands used to copy and decrypt the files make a screen capture showing the decrypted file contents
You are conducting a security investigation of malicious activity that took place on the target Linux or one workstation. As part of your investigation, you would like to send a log file from the system to your instructor to get advice on interpreting logging attempts. D authentication log stored in the /var/log/auth.log file.
Log into the TargetLinux01 system Using the student accounts, a copy of the file and encrypt it using AES encryption So that's only Matthew hunter can read the file.
Make a screen capture showing the commands used to encrypt and copy the file
Next, copy the file to the instructor account and decrypt it there
make a screen capture showing the commands used to copy and decrypt the files
make a screen capture showing the decrypted file contents
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images