Linux File System Analysis
Practical triage of Linux file systems for anomalies, metadata, and hidden files
Overview
This project guides you through analyzing a Linux file system using built-in commands
to identify anomalies, track suspicious files, and understand disk usage. You will learn
how to list directories (including hidden ones), inspect file metadata and timestamps,
search content for secrets, and safely mount/unmount additional storage volumes.
By the end of this project, you will:
- Enumerate Linux directories and hidden files for quick triage.
- Extract and analyze file metadata (inode, permissions, MAC times).
- Identify anomalies such as large or empty files and sensitive strings.
- Measure disk usage and pinpoint oversized or hidden artifacts.
- Safely mount/unmount external volumes for forensic analysis.
What You'll Learn
-
Linux File System Triage
Understand directory layouts, hidden files, and basic triage workflow.
-
Metadata & MAC Times
Use stat and find to analyze permissions, inodes, and file timestamps.
-
Disk Usage Analysis
Detect heavy directories, large dumps, and monitor filesystem space.
-
Mounting Evidence Safely
Learn proper techniques to mount/unmount drives in read-only mode for forensic integrity.
About Trainer
Rajneesh Gupta
Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity". As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Related Projects
Apache Server Log Analysis using Splunk
Detecting Brute Force, SQL Injection, XSS, and Suspicious Web Activity from Apache Access Logs with Splunk SIEM
Practical AWS Cloud Security Posture Assessment Using Scout Suite
Identify real-world AWS attack surfaces through visual security posture analysis.
Introduction to Memory Forensics
Understanding Volatile Data, RAM Analysis, and Forensic Tools