SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWeb logs can be analyzed with specific attention to Internet Background Abuse (IBA), a term to be defined here as a subset of Internet Background Radiation (IBR). Two bands of the IBR spectrum include scanning and misconfiguration and can be applied to Internet Background Abuse where details about attacker and victim patterns are readily available. Via web application specific examples this paper will discuss tooling and methods to analyze attacks exhibiting traits, trends, and tendencies from the attacker and victim perspectives.