Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

📝 Case Study: Disgruntled (DFIR)

🔹 Overview

This investigation examines activity from a compromised workstation used by a disgruntled employee.
The goal was to determine what the user did on the host, identify malicious artifacts (a logic bomb), and confirm exfiltration or destructive actions.

Skills demonstrated:


🔍 Key Activities & Highlights

1. Review sudo / install activity

auth.log install evidence


2. User creation and sudo grant

adduser evidence sudoers update evidence


3. Script activity and editor history

vi opened bomb.sh


4. Download and creation of the malicious script

Reviewed .bash_history of the user (it-admin) and other artifacts.

Findings:

curl download command evidence os-update.sh file evidence


5. Script contents and payload

Findings:

script contents


6. Scheduling — crontab analysis

crontab evidence

Conclusion

Recommendations / Lessons Learned


🔗 Navigation