Talk With an Expert

A Network Analysis of a Web Server Compromise

A Network Analysis of a Web Server Compromise (PDF, 3.28MB)Published: 08 Sep, 2015
Created by
Kiel Wadner

Through the analysis of a known scenario, the reader will be given the opportunity to explore a website being compromised. From the initial reconnaissance to gaining root access, each step is viewed at the network level. The benefit of a known scenario is assumptions about the attackers' reasons are avoided, allowing focus to remain on the technical details of the attack. Steps such as file extraction, timing analysis and reverse engineering an encrypted C2 channel are covered.