Career-Simulation-1

Back to Home 🏠 Back to Introduction Next: Stage: Analysis

Stage Identification

The first step in a digital forensics investigation is to identify the devices and resources containing the data that will be a part of the investigation (Gonzalez, 2022).

With Splunk storing its files within the /opt/splunk directory, the first step was to locate the config.conf file (Figure 1). Basic file navigation commands were utilized to navigate to the specified directory and confirm the presence of the file. This initial step ensured accurate file identification, which is crucial for precise modifications.

fstack@:~$ find /opt/splunk/ -name "config.conf"
/opt/splunk/etc/system/local/config.conf

Fig.1 Command to locate the config.conf file (find)

Subsequently, an assessment of the file permissions of config.conf was conducted using the ls -l command (Figure 2). The output revealed the permissions as 777, indicating full permissions for the file’s owner, group, and others. This information provided insights into potential issues affecting its integrity (Principle of least privileges).

fstack@~$ cd /opt/splunk/etc/system/local; ls -l
-rwxrwxrwx 1 root root 238 Feb 16:59 config.conf

Fig.2 Commands to list the config.conf file (cd, ls -l)

Ensuring the file’s integrity, the md5sum command was employed to calculate and record the MD5 hash value of config.conf. This served as a baseline for comparison after making modifications to the file, enabling verification of the integrity of changes made.

fstack@:/opt/splunk/etc/system/local$ md5sum config.conf 
ad1f9b6cbcee6cd3efa6438149db5c1c  config.conf

Fig.3 Command to hash the config.conf file (md5sum)

Back to Home 🏠 Back to Introduction Next: Stage: Analysis