: Disconnect from the network to prevent further data exfiltration.

: Review /var/log/auth.log (Debian/Ubuntu) or /var/log/secure (RHEL/CentOS) for brute-force attempts or successful logins from unknown IPs. C. Persistence Mechanisms

: Check /etc/crontab and /var/spool/cron/crontabs/ for scheduled reverse shells.

The investigation focuses on a compromised workstation (represented by the image inside the RAR). The goal is to identify the , the malicious actions taken by the attacker, and any persistence mechanisms established on the system. 1. Initial Triage & Evidence Collection File Name : brno-v5.rar

: Check for newly created accounts or accounts with UID 0 (root privileges).

: Identifying a .tar or .zip archive created by the attacker containing sensitive data (e.g., /etc/shadow or user documents). 4. Remediation Recommendations

: Change all system passwords and revoke suspicious SSH keys.