8 Through Logs and Fire

Our latest hacking attempts have failed, but we’re not quite back to square one. We now have a much better understanding of Strat Jumbo’s security, and that is very valuable. The more we know about the traps that have been carefully laid out, the better equipped we are to avoid them, so we’ll now see what more information we can dig up on QRadar and Microsoft ATA, our main adversaries.

We can never fully mimic all Strat Jumbo system activity, and we can only speculate about which suspicious behaviors QRadar was configured or trained to monitor. Our strategy for defeating this black box predator will most likely consist ...

Get How to Hack Like a Legend now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.