官术网_书友最值得收藏!

  • Hands-On Network Forensics
  • Nipun Jaswal
  • 84字
  • 2021-06-24 16:04:17

Domain controller/authentication servers/ system logs

Authentication servers can allow an investigator to view login attempts, the time of the login, and various other login-related activities throughout the network. Consider a scenario where a group of attackers tries to use a compromised host to log into the database server by using the compromised machine as a launchpad (pivoting). In such cases, authentication logs will quickly reveal not only the infected system, but also the number of failed/passed attempts from the system to the database server.

主站蜘蛛池模板: 苗栗市| 丹江口市| 宁晋县| 广宁县| 泰兴市| 阜新市| 元阳县| 岳西县| 新乐市| 旺苍县| 定襄县| 襄城县| 渭南市| 鄂托克旗| 永靖县| 西乌珠穆沁旗| 长治县| 济宁市| 江川县| 交城县| 新兴县| 蒙阴县| 梧州市| 南投县| 台湾省| 大同县| 恭城| 博客| 肃宁县| 承德市| 左权县| 鲁甸县| 民权县| 柳河县| 阿克| 江达县| 修水县| 怀宁县| 平利县| 衡阳市| 家居|