Honeynet Project Challenge: Scan 34

The Honeynet Project's latest Scan of the Month challenge is online. As usual, the challenge is to analyze various log files and determine whether the system was compromised and if so then how? The logs include data collected from an Apache server, a Linux system, iptables firewall, and a Snort IDS system. If you plan to participate then your forensic analysis is due by May 9th and the person who submits the best analysis will receive a copy of Security Warrior by Anton Chuvakin.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish