System Analysis: Investigating a Compromised Linux Server

What command should the administrator run next to further analyze the compromised system?

1286 ? Ss 0:00 /usr/sbin/cupsd -f 1287 ? Ss 0:00 /usr/sbin/httpd 1296 ? Ss1 0:00 /usr/bin/libvirtd 1301 ? Ss 0:00 ./usr/sbin/sshd -d 1308 ? Ss 0:00 /usr/sbin/atd -f

A. strace /proc/1301 B. rpm -v openssh-server C. /bin/ls -l /proc/1301/exe D. kill -9 1301

Answer:

The administrator should run the 'strace /proc/1301' command to further analyze the compromised system.

In this scenario, the administrator is investigating a compromised Linux server by analyzing the processes running on the server. The output of the ps command shows several processes, including the sshd process with ID 1301, which is suspected to be involved in the compromise.

The 'strace' command is a powerful tool for system analysis that allows the administrator to trace and debug system calls made by a particular process. By running 'strace /proc/1301', the administrator can gather detailed information about the system calls being made by the sshd process. This information can help in identifying any malicious activity or unauthorized actions being taken by the process.

On the other hand, the other options provided are not suitable for further analysis of the compromised system:

- 'rpm -v openssh-server' is a command to verify the integrity of the openssh-server package but does not provide specific information about the compromised system.

- '/bin/ls -l /proc/1301/exe' is a command to check the symbolic link target of the exe file in the /proc/1301 directory but does not offer detailed analysis of the running process.

- 'kill -9 1301' is a command to forcefully terminate the process with ID 1301 but does not assist in analyzing the compromised system.

By using the 'strace' command, the administrator can gain valuable insights into the behavior of the sshd process and take necessary actions to secure the compromised server.

← Introduction to fundamentals of python data structures by ken lambert Identifying the features of unmanaged packages →