YUM Sources

Overview

Evidence: Yum Sources Description: Collect Yum Sources Category: System Platform: Linux Short Name: yumsourc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

This collector gathers yum sources information from the Linux system. This data is essential for understanding system activity, detecting security incidents, and investigating system-related events.

Data Collected

This collector gathers structured data about yum sources.

Yum Sources Data

Field
Description
Example

ID

Primary key (auto-increment)

1

Name

Repository name

base

BaseURL

Base URL

http://mirror.centos.org/centos/7/os/x86_64/

Enabled

Repository enabled

1

GPGCheck

GPG check enabled

1

Source

Source file

/etc/yum.repos.d/CentOS-Base.repo

Collection Method

This collector parses the necessary data from the yum_sources table.

Usage

This evidence is crucial for forensic investigations as it provides yum sources information. It helps investigators understand system activity, detect security incidents, and investigate system-related events. The data can reveal system changes, unauthorized activities, and potential security vulnerabilities. Analysts can use this information to identify system compromises, trace malicious activities, and assess Linux security posture.

Notes

This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.

Last updated

Was this helpful?