Web Server Compromise
Abstract
There are times when we will receive more than just an image for analysis; we may get logs associated with the incident, and we may have other data available that we can incorporate into the investigation, as well. Many times, these additional and/or external sources of data can be used to significantly improve the context and granularity of your analysis.
Keywords
Intrusion; compromise; web server; memory dump; volatility
- • Windows 2008 Web Server
Introduction
Investigating Windows systems is not always just about analyzing an image ...
Get Investigating Windows Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.