Skip to content
LinuxExecutionCritical

Bash Shell History

Per-user record of every interactive shell command executed by Bash, written to ~/.bash_history on logout (or in real time when HISTTIMEFORMAT and PROMPT_COMMAND are configured).

artifact_type: linux_bash_history

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $~/.bash_history
  • $/root/.bash_history
  • $/home/*/.bash_history
  • $~/.zsh_history

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Reconstructing attacker post-exploitation activity on a Linux host
  • Insider threat — proving a sysadmin ran destructive commands
  • Identifying credentials accidentally typed inline (e.g., curl -u user:pass)
  • Linking lateral movement via ssh/scp commands across hosts

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
Plaso (log2timeline)
Sleuth Kit
grep

Related artifacts

References & further reading

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI