Scenario
Dokumentasi Simulasi Forensik OS - Simplified
1. SETUP ENVIRONMENT
[ x ] Screenshot:
wsl --list
showing Kali & Ubuntu[ x ] Screenshot: SSH service running di Ubuntu (
systemctl status ssh
)[ x ] Screenshot: Network IP kedua WSL (
ip addr
)[ x ] Penjelasan: WSL networking dan SSH setup
2. BACKDOOR DEPLOYMENT
[ x ] Screenshot: File monitor script (
file_monitor.sh
)[ x ] Screenshot: Script running in background (
ps aux | grep monitor
)[ x ] Screenshot: Log directory created (
ls -la /tmp/.logs/
)[ ] Penjelasan: Teknik monitoring filesystem events secara stealth
3. VICTIM ACTIVITIES
[ ] Screenshot: ZIP creation dengan password (
zip -P "password" file.zip
)[ ] Screenshot: Environment variable dengan password (
echo $ARCHIVE_PASSWORD
)[ ] Screenshot: Bash history showing sensitive commands
[ ] Penjelasan: Password leakage melalui environment variables
4. LOG CAPTURE & ANALYSIS
[ ] Screenshot: Real-time log file (
tail -f /tmp/.system_activity.log
)[ ] Screenshot: Base64 decoded log entries
[ ] Screenshot: Password extraction dari logs
[ ] Penjelasan: Log analysis untuk credential harvesting
5. ATTACK EXECUTION
[ ] Screenshot: SSH connection dari Kali ke Ubuntu
[ ] Screenshot: Remote log access (
cat /tmp/.system_activity.log
)[ ] Screenshot: Password testing (
unzip -t secret.zip
)[ ] Penjelasan: Remote access dan credential validation
6. ZIP COMPROMISE
[ ] Screenshot: Successful ZIP extraction dengan stolen password
[ ] Screenshot: Sensitive file contents revealed
[ ] Penjelasan: Impact dari credential theft
7. FORENSIC EVIDENCE
[ ] Screenshot: Timeline reconstruction dari logs
[ ] Screenshot: Attack chain visualization
[ ] Screenshot: Security gaps identified
[ ] Penjelasan: Forensic analysis methodology dan findings
Total: ~20 screenshots + 7 technical explanations
KEY FOCUS AREAS:
Password Leakage - Environment variables & bash history
Log Monitoring - Stealth file system monitoring
Remote Access - SSH exploitation
Credential Harvesting - Extract passwords dari logs
Impact Demonstration - Sensitive data access
Dokumentasi
Dokumentasi simulasi dan explanationnya akan gw masukin di sini
Simulasi SISOPOS Forensic ExplanationLast updated