About:

Hal Pomeranz is an IT expert with a focus on forensic investigation and a passion for sharing insights and humor.

Website:

Specializations:

Interests:

Information Technology Forensic Investigation Technical Content IT Industry Issues

Outgoing Links:

Subscribe to RSS:
A detailed guide on customizing the 'ls' command in Unix/Linux to display file timestamps effectively and improve command-line efficiency.
The author discusses a method for persisting a Linux LKM rootkit across reboots by leveraging systemd-modules-load. They demonstrate how to add the evil module into the /usr/lib/modules/$(uname -r) directory and then run depmod. T...
The text discusses the use of Linux persistence mechanisms for running programs in user space, focusing on using persistence mechanisms for running programs in user space. It also talks about using the Diamorphine LKM rootkit to h...
The text discusses the issue of wasting time, effort, and money on projects that promise revolutionary technology but fail to deliver. It uses examples from nuclear engineering and IT to illustrate the problem and warns against fa...
The text discusses the EXT4 file system and its timestamp system, which allows it to get past the Y2K-like problem that normal 32-bit epoch timestamps face in the year 2038. It explains how EXT4 handles timestamps, the range of ti...
The text discusses the Systemd journal and journalctl, explaining how they are an upgrade over traditional Syslog. It details the binary format of Systemd journals, the metadata they carry, and the command-line tool journalctl for...
The text discusses the technique of hiding Linux processes with bind mounts. The author explains how to use bind mounts to mount a different directory on top of the /proc/PID directory for the evil process, effectively hiding it. ...
The text discusses the process of recovering deleted files in XFS. It explains how to examine the directory and inode, view the block as a directory, and examine the inode. It also provides a script to read the extent structures f...
The text is an introspective moment of Hal Pomeranz, an independent consultant in the IT industry. He talks about his journey, advice for people starting out, certifications, degrees, and his interest in IT and cybersecurity. He a...

0Working With UAC

2024-06-04

The text discusses the UAC tool for collecting artifacts during incident response, and how to modify UAC to add new artifacts for specific purposes. It covers the process of modifying profiles, adding specific artifacts, and valid...

0Systemd Timers

2024-05-05

The text discusses Systemd timers, a new task scheduling system in Linux that provides similar functionality to cron and atd systems. It explains how Systemd timers work, how to configure them, and how to activate them using the s...