Forensic Analysis “We have just

โ€”

by

in

Forensic Analysis

“We have just covered a step by step analysis of how a honeypot compromised. The goal was to determine how the system was compromised using forensic anaylisis of system and IDS logs. By analyzing this attack, you should have a better understanding of what to expect and look for when analyzing a system attack. If you would like to learn more about how this information was obtained, check out To Build A Honeypot.”