You are conducting a security investigation of malicious activity that took place on the target Linux or one workstation. As part of your investigation, you would like to send a log file from the system to your instructor to get advice on interpreting logging attempts. D authentication log stored in the /var/log/auth.log file. Log into the TargetLinux01 system Using the student accounts, a copy of the file and encrypt it using AES encryption So that's only Matthew hunter can read the file. Make a screen capture showing the commands used to encrypt and copy the file Next, copy the file to the instructor account and decrypt it there make a screen capture showing the commands used to copy and decrypt the files make a screen capture showing the decrypted file contents
You are conducting a security investigation of malicious activity that took place on the target Linux or one workstation. As part of your investigation, you would like to send a log file from the system to your instructor to get advice on interpreting logging attempts. D authentication log stored in the /var/log/auth.log file.
Log into the TargetLinux01 system Using the student accounts, a copy of the file and encrypt it using AES encryption So that's only Matthew hunter can read the file.
Make a screen capture showing the commands used to encrypt and copy the file
Next, copy the file to the instructor account and decrypt it there
make a screen capture showing the commands used to copy and decrypt the files
make a screen capture showing the decrypted file contents
![](/static/compass_v2/shared-icons/check-mark.png)
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)