+1 (218) 451-4151
glass
pen
clip
papers
heaphones

trends

trends

part-1

  • How does the malware install itself as a service?
  • How can malware running as a service be detected without using the registry?

Part-2

  • Illustrate the role of the shadow file.
  • Illustrate the role of the history file.
  • Illustrate the role of the auth.log file.
  • Discuss one way to identify vulnerable services on a Linux machine and how you would determine if the service is vulnerable to exploitation.