Hacker’s Review – The Case of The Left Attack Trace
- Stopnja 300
09. april 2014 11:30
Ok, so that’s what has happened: attacker got into our infrastructure, used SQL Server’s misconfiguration, created himself an account and… Exactly! And what? This is the moment that we wonder what else could happen and if it is possible to trace back hacker’s activities in our systems. Yes it is! By performing several analysis we are able to get enough evidence of performed malicious actions. Come and see what does it mean to be hacked and that nothing can be completely hidden!