Chapter 4

Web Server Compromise

Abstract

There are times when we will receive more than just an image for analysis; we may get logs associated with the incident, and we may have other data available that we can incorporate into the investigation, as well. Many times, these additional and/or external sources of data can be used to significantly improve the context and granularity of your analysis.

Keywords

Intrusion; compromise; web server; memory dump; volatility

Information in This chapter
  • • Windows 2008 Web Server

Introduction

Investigating Windows systems is not always just about analyzing an image ...

Get Investigating Windows Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.