LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 03-21-2024, 04:18 AM   #1
alex0009
LQ Newbie
 
Registered: Mar 2024
Posts: 8

Rep: Reputation: 0
private forensys


I would like to know from the analysis of which directories\files\processes one can draw an unambiguous conclusion: there was a user here. Maybe it’s better to use the commands
Code:
-ctime, -atime, -mtime
, and which directories /subdirectories, processes to look at? Maybe there is a manual on this topic? I would appreciate any answers.
 
Old 03-21-2024, 05:21 AM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,852

Rep: Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310
I'm not really sure I understand what are you looking for, but probably you need inotify.
 
Old 03-21-2024, 08:58 PM   #3
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,326
Blog Entries: 28

Rep: Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142
If you mean whether someone was logged into the system, this link should help.
 
Old 03-23-2024, 09:31 PM   #4
goldennuggets
Member
 
Registered: Feb 2003
Location: USA
Distribution: Kubuntu, Manjaro
Posts: 239

Rep: Reputation: 24
Quote:
Originally Posted by alex0009 View Post
I would like to know from the analysis of which directories\files\processes one can draw an unambiguous conclusion: there was a user here. Maybe it’s better to use the commands
Code:
-ctime, -atime, -mtime
, and which directories /subdirectories, processes to look at? Maybe there is a manual on this topic? I would appreciate any answers.
Assuming you're referring to the following:
Access timestamp (atime): which indicates the last time a file was accessed.
Modified timestamp (mtime): which is the last time a file’s contents were modified.
Change timestamp (ctime): which refers to the last time some metadata related to the file was changed.

Please let me know if this reference helps: https://www.geeksforgeeks.org/file-t...time-in-linux/
 
Old 03-25-2024, 05:34 AM   #5
alex0009
LQ Newbie
 
Registered: Mar 2024
Posts: 8

Original Poster
Rep: Reputation: 0
I understand that this is my crooked English, the reason for the misunderstanding. Ok, I'll start from the beginning.
1. I am interested in events on the computer more than 2 years ago, and for a specific period of dates.
2. I understand that all possible journals for this period are no longer available.
3. The
Code:
find
command with descriptors
Code:
-mtime, -ctime,-atime
is still working.
4. Using this command, I found all the files that have not yet been overwritten, have not changed, etc.
5. A large number of files in the
Code:
/snap, .../snap
and similar directories with the same date of modification, change, creation, what are they talking about? I only think that the computer was turned on and online. Since Snap works in automatic mode, we cannot definitely link a user to the process. I'm right?
6. A large number of files in the
Code:
media/user_name/...
directory with the same date of modification, change, creation, what are they talking about? I think that the user has connected a removable device, and this clearly indicates the user. Am I right?
7. It would seem that eureka is what we need.... But not everything is so simple, this is not the time period that I need.
8. I hope now you understand, I am looking for directories, files for certain dates. Changes, modifications in which clearly linked with user . I ask you to write here in which directories you think such files may be located. There is no cache from the browser jobs.
9. It is quite possible that this is not the right way to search, then I will be glad to get some hints.
10. By the way, if you have any ideas on how to find out if a virtual machine has started, I will be happy to read your comments.
I see drivers and services are installed, but updated. If only some specific files remain in the system. Where?

Last edited by alex0009; 03-25-2024 at 05:58 AM.
 
Old 03-25-2024, 06:31 AM   #6
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,852

Rep: Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310
It is still unclear (for me). You cannot look for old events on the computer. That information is not available (obviously if it was logged you can check those logs, but by default it is not logged).
You cannot use mtime, ctime, atime, root has right to overwrite everything (including credentials, permissions and any other attributes), for example you may find files which are older than your hardware or created by non-existing users.
 
Old 03-25-2024, 06:59 AM   #7
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,297

Rep: Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322
@OP: I think it's a bit rich to ask us to write you a general "How to do Computer Forensics" manual. That's what you're looking for. People who know what they are doing can cover their tracks very well anyhow in linux, unlike windows. Hire someone, give him the pc, and ask if he can find anything. A person trying to stay hidden can use Tails (The Amnesiac Incognito Linux System) for years on a pc and you'll find no trace.

Last edited by business_kid; 03-25-2024 at 07:19 AM.
 
Old 03-25-2024, 07:47 AM   #8
alex0009
LQ Newbie
 
Registered: Mar 2024
Posts: 8

Original Poster
Rep: Reputation: 0
It turns out that either I didn’t write everything you need, or my language is completely crooked.
I wrote it myself, after checking many times, that there are no magazines. I wrote to you myself that I found a lot of files with timestamp from 2 years ago, and it’s true.
And I'm not asking you to do forensic analysis or write a manual. I just ask you to express your opinion on which folders contain traces of launched applications, virtual machine startup, and so on. It is not at all necessary that this user - the owner of the computer - covered his tracks there. But now I have this computer, and this is also true. And I'm just a curious Windows user. Starting to learn Ubuntu from scratch is too much for me.)
 
Old 03-25-2024, 02:52 PM   #9
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,297

Rep: Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322
I know you're suspicious, but if the owner of the pc knew what to do and covered his tracks, any amateur is not going to find anything.

You have one very slender thread of hope, if the disks are spinning rust and not SSDs on NVMEs. Files resident on a disk for some time leave the tiniest trace of residual magnetism on a disk. Forensics techniques exist to read that residual magnetism and recover those lost files, probably as isolated sectors with data. I know nothing more than what's in the shred man page. If you are prepared to pay somebody with that equipment, he can work on your drive, but you'll have to pay whether he comes up with anything or not, and I wouldn't raise your hopes. No residual magnetism exists on SSDs or NVMEs.

there is a little known program called 'shred' which overwrites the disk many times to confuse the residual magnetism, and can make the above technique useless. If somebody has data they don't want found, they can encrypt it anyhow in linux. So you might find the data (as gibberish) but not be able to decrypt and read it. Someone who "covers his tracks" but didn't encrypt his data or shred his disk on his way out the door is a fool indeed.

In summary, you're likely to get nothing. If you want to throw money at it, hire someone that others can vouch for. This is out of your league altogether.
 
Old 03-26-2024, 03:02 AM   #10
alex0009
LQ Newbie
 
Registered: Mar 2024
Posts: 8

Original Poster
Rep: Reputation: 0
After all, this is an SSD drive. And I myself drove it with different programs, nothing. But first of all, I have a question, why were points 5 and 6 left unanswered? Nobody wrote yes or no.
Secondly, dear forum members want to tell me that in Ubuntu there are no traces of human activity in any case?
Then what about point 6, if I’m right of course?
 
Old 03-26-2024, 04:50 AM   #11
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,852

Rep: Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310Reputation: 7310
It was already told, if you want to log all the activities on a host you can switch it on, but by default is is off. Not used. Moreover, it is hardly possible to distinguish between human and automatic activities.
You won't get answers, because we can't see those files and therefore we cannot explain their existence (or absence).
It can be the package content, some generated or user specific data or anything else.
 
Old 03-26-2024, 08:12 AM   #12
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,297

Rep: Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322Reputation: 2322
The 6 points were4 left unanswered, because we're volunteering our expertise. We're not under compulsion. If you want them answered, do your own research.

You have an SSD. So you're going to find nothing. Goodbye.
 
1 members found this post helpful.
Old 03-28-2024, 02:12 AM   #13
___
Member
 
Registered: Apr 2023
Posts: 139
Blog Entries: 1

Rep: Reputation: Disabled
Refine (try various) web-search keywords until you find info that is most useful to you. For example:
https://www.forensicfocus.com/articl...sics-analysis/
 
Old 03-28-2024, 06:39 PM   #14
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,226

Rep: Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320
You’re out of luck. The information you’re looking for does not exist.

If you want to start collecting it, then some ways are described here:

https://superuser.com/questions/2229...nches-in-linux

But if you weren’t collecting it two years ago then yeah, it’s too late.

Last edited by dugan; 03-28-2024 at 06:41 PM.
 
Old 03-28-2024, 06:53 PM   #15
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,226

Rep: Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320
EDIT: And seconding Frankbell.

Last edited by dugan; 03-28-2024 at 06:54 PM.
 
  


Reply

Tags
catalog



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Cascading ISP-Modem-Router and Private Router - No Internet connection on private one glupa4e Linux - Networking 15 01-28-2024 04:07 AM
How do I convert a putty private key to be used as a private key on a RedHat or Ubuntu Server greavette Linux - General 2 06-26-2019 08:40 PM
Is Private Web Browsing Really Private? LinuxCrushesWindows Linux - Software 16 03-03-2014 12:38 PM
Accessing a private LAN from another private LAN sholah Linux - Networking 3 07-10-2007 08:17 PM
LXer: Keep your private documents private LXer Syndicated Linux News 0 06-07-2006 03:21 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 03:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration