Back to Home ๐ | Back to Stage: Identification | Next: Stage: Preservation |
Once the devices involved have been identified and isolated, and the data has been duplicated and stored securely, digital forensic investigators use various techniques to extract relevant data and examine it, searching for clues or evidence that points to wrongdoing (Gonzalez, 2022).
With a clear understanding of the fileโs location, permissions, and integrity status, the process to edit the config.conf file was undertaken. The Vim text editor was used to append the configuration lines (Figure 2. [admin]: AliceAdmin1 & IvanAdmin2) to enable proper logging functionality within the Splunk server.
fstack@:/opt/splunk/etc/system/local$ vim config.conf
[inputs]
- Windows logs
- Firewall logs
- Jira logs
- Software engineering logs
- IPS logs
- IDS logs
- WAF logs
[viewers]
- Emily
- Neel
- James
- Riley
- Sara
# Configuration lines added
[admin]
โ AliceAdmin1
โ IvanAdmin2
Fig.4 Command to edit the config.conf
file (vim)
Following the editing process, another round of MD5 hash verification confirmed the integrity of the modified config.conf file, validating that the modifications were successfully applied without unintended alterations (Figure 5).
fstack@:/opt/splunk/etc/system/local$ md5sum config.conf
46dfaf406b12c9d1ca9b293660c2939b config.conf
Fig.5 Command to hash the config.conf
file (md5sum)
Back to Home ๐ | Back to Stage: Identification | Next: Stage: Preservation |