Beginner Free

Linux File System Analysis

Practical triage of Linux file systems for anomalies, metadata, and hidden files

Self-Paced by Rajneesh Gupta

Overview

This project guides you through analyzing a Linux file system using built-in commands
to identify anomalies, track suspicious files, and understand disk usage. You will learn
how to list directories (including hidden ones), inspect file metadata and timestamps,
search content for secrets, and safely mount/unmount additional storage volumes.

By the end of this project, you will:

  • Enumerate Linux directories and hidden files for quick triage.
  • Extract and analyze file metadata (inode, permissions, MAC times).
  • Identify anomalies such as large or empty files and sensitive strings.
  • Measure disk usage and pinpoint oversized or hidden artifacts.
  • Safely mount/unmount external volumes for forensic analysis.

What You'll Learn

  • Linux File System Triage

    Understand directory layouts, hidden files, and basic triage workflow.

  • Metadata & MAC Times

    Use stat and find to analyze permissions, inodes, and file timestamps.

  • Disk Usage Analysis

    Detect heavy directories, large dumps, and monitor filesystem space.

  • Mounting Evidence Safely

    Learn proper techniques to mount/unmount drives in read-only mode for forensic integrity.

About Trainer

Rajneesh Gupta

Rajneesh Gupta

Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity". As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.

Related Projects

Apache Server Log Analysis using Splunk
Pro Intermediate

Apache Server Log Analysis using Splunk

Detecting Brute Force, SQL Injection, XSS, and Suspicious Web Activity from Apache Access Logs with Splunk SIEM

Practical AWS Cloud Security Posture Assessment Using Scout Suite
Free Beginner

Practical AWS Cloud Security Posture Assessment Using Scout Suite

Identify real-world AWS attack surfaces through visual security posture analysis.

Introduction to Memory Forensics
Free Beginner

Introduction to Memory Forensics

Understanding Volatile Data, RAM Analysis, and Forensic Tools