The Honeynet Project's latest Scan of the Month challenge is online. As usual, the challenge is to analyze various log files and determine whether the system was compromised and if so then how? The logs include data collected from an Apache server, a Linux system, iptables firewall, and a Snort IDS system. If you plan to participate then your forensic analysis is due by May 9th and the person who submits the best analysis will receive a copy of Security Warrior by Anton Chuvakin.
0 comments
Hide comments