.
/ ..
at the start
Example: malware.jpg
to .
or ..
.
4.0K drwxrwxr-x 2 user user 4.0K May 26 12:11 .
4.0K -rw-rw-r-- 1 user user 12 May 26 12:11 '. '
4.0K drwxrwxr-x 4 user user 4.0K May 26 12:07 ..
4.0K -rw-rw-r-- 1 user user 13 May 26 12:11 '.. '
/dev
, /tmp
, /etc
, /usr/loca/man
, /usr/src
etc/etc/syslog.conf
. By looking at it, we can find out where the system is configured to store the log files./var/log/secure
and /var/log/messages
and logs of the certain services we exploited to get into the network/var/log
) are written in ASCII and often edited by using a text editor of a PERL scriptThere are certain files in our UNIX system which can't be edited by a normal text editor and we'll end up corrupting them if we do so, we require special tools for them because there are certain binary data structures built into those log files.
They are /var/run/utmp
, /var/log/wtmp
, /var/log/btmp
, /var/log/lastlog
~/.zsh_history
, ~/.bash_history
etc.