part-1
- How does the malware install itself as a service?
- How can malware running as a service be detected without using the registry?
Part-2
- Illustrate the role of the shadow file.
- Illustrate the role of the history file.
- Illustrate the role of the auth.log file.
- Discuss one way to identify vulnerable services on a Linux machine and how you would determine if the service is vulnerable to exploitation.