{"id":573,"date":"2000-10-26T04:56:29","date_gmt":"2000-10-26T04:56:29","guid":{"rendered":"http:\/\/www.soulhuntre.com\/items\/date\/2000\/10\/26\/forensic-analysis-we-have-just\/"},"modified":"2000-10-26T04:56:29","modified_gmt":"2000-10-26T04:56:29","slug":"forensic-analysis-we-have-just","status":"publish","type":"post","link":"http:\/\/legacyiamsenseiken.local\/2000\/10\/26\/forensic-analysis-we-have-just\/","title":{"rendered":"Forensic Analysis “We have just"},"content":{"rendered":"

Forensic Analysis<\/a><\/p>\n

“We have just covered a step by step analysis of how a honeypot compromised. The goal was to determine how the system was compromised using forensic anaylisis of system and IDS logs. By analyzing this attack, you should have a better understanding of what to expect and look for when analyzing a system attack. If you would like to learn more about how this information was obtained, check out To Build A Honeypot.”<\/p>\n","protected":false},"excerpt":{"rendered":"

Forensic Analysis “We have just covered a step by step analysis of how a honeypot compromised. The goal was to determine how the system was compromised using forensic anaylisis of system and IDS logs. By analyzing this attack, you should have a better understanding of what to expect and look for when analyzing a system […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[278],"tags":[],"_links":{"self":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts\/573"}],"collection":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":0,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts\/573\/revisions"}],"wp:attachment":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/media?parent=573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/categories?post=573"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/tags?post=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}