- Hands-On Network Forensics
- Nipun Jaswal
- 84字
- 2021-06-24 16:04:17
Domain controller/authentication servers/ system logs
Authentication servers can allow an investigator to view login attempts, the time of the login, and various other login-related activities throughout the network. Consider a scenario where a group of attackers tries to use a compromised host to log into the database server by using the compromised machine as a launchpad (pivoting). In such cases, authentication logs will quickly reveal not only the infected system, but also the number of failed/passed attempts from the system to the database server.
推薦閱讀
- RESTful Java Web Services Security
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- 黑客攻防入門(mén)秘笈
- 計(jì)算機(jī)使用安全與防護(hù)
- Penetration Testing with Perl
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- Testing and Securing Android Studio Applications
- 從0到1:CTFer成長(zhǎng)之路
- 信息安全導(dǎo)論(第2版)
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- Cybersecurity Threats,Malware Trends,and Strategies
- Mastering Python for Networking and Security
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究