Day 15 Web Attack Forensics

Overview

This exercise we are analyzing a case where attacks execute OS commands on a web server, which, if successful, leads to system compromise.

2. Description

2.1 Check the HTTP Request Log

2.2 Check Server Side Error

2.3 Look for 500 Internal Error

2.3 Confirm Attacker Enumeration Activity

last modified: 2025-12-15 11:35