Browse by Tags

Tagged Content List
  • Wiki Page: IR Playbook Web defacement

    If you are working with CSS Security they can assist with data gathering and analysis Web Defacement can be broken down into 2 categories. Data on the file system was modified WEBDAV permissions issues FPSE permissions issues Files modified via FTP Files modified via SMB Files modified...
  • Wiki Page: IR Playbook File Server Folder File tampering

    File server tampering by malware can happen in multiple different ways listed are some of the example scenarios: Legitimate office document files .doc/.xls etc have their attributes modified to be Hidden/System and new executables with duplicate names are created with a shell icon that resembles...
Page 1 of 1 (2 items)
Can't find it? Write it!