#### L7 - Step 3 ### evil_ear #### L8 Sorter - exec.txt #### fast.exe #### L8 Sorter - mismatch.txt #### moni.lod gates.lod #### L8 Sorter - unknown.txt #### secret-ec2.pem #### L10 Keys #### authorized_keys credentials AKIAJYSOCJXDYU3RNQFQ WnukQBKjg6dc89221LHnupvvlwh96sIc1WNL7vhv #### L12 - clam-fs-log #### .sshd .libgcc /usr/sbin/ss ft32 eicar.com.txt ft64 /bsd-port/getty ddus-uidgen /bin/netstat eafef5b086d1e5940ab27a617e48b7c4 wipefs 360.war Weblog acpidtd #### L12 - clam-us-log #### ft64 jsse.jar ft32 /sample2/.sshd Weblog sample2/.libgcc wipefs #### L13 - Loki #### /lib/.libgcc 4fa4269b7ce44bfce5ef574e6a37c38f w64.exe 5f6e83481122b6d9a297eaa19d12a56d w32.exe c7ca09eb3159da279e2c17b388c84ff1 #### L14 - cron jobs #### wipefs hello #### L14 - Start-up Scripts S97DbSecuritySpt DbSecuritySpt K92iptables iptables S53hibinit-agent hibinit-agent S01acpidtd acpidtd S01wipefs wipefs #### L15 - linux_mount/tmp #### dga1.sh evil_ear gates.lod listen4evil moni.lod fdf188562ca4d8e5f38f39ce1ae0ed9d tmplog #### L15 - High Entropy #### top-secret.enc #### L16 - ec2-user/.bash_history #### dont_peek.sh #### L16 - /etc/passwd #### aws-ssm