- Hands-On Network Forensics
- Nipun Jaswal
- 84字
- 2021-06-24 16:04:17
Domain controller/authentication servers/ system logs
Authentication servers can allow an investigator to view login attempts, the time of the login, and various other login-related activities throughout the network. Consider a scenario where a group of attackers tries to use a compromised host to log into the database server by using the compromised machine as a launchpad (pivoting). In such cases, authentication logs will quickly reveal not only the infected system, but also the number of failed/passed attempts from the system to the database server.
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 白帽子講Web安全(紀(jì)念版)
- 黑客攻防技巧
- 工業(yè)物聯(lián)網(wǎng)安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 局域網(wǎng)交換機(jī)安全
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 黑客攻防從入門到精通
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測(cè)與響應(yīng)
- 黑客攻防入門
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御