Disclaimer: I have no intention of detailing how the box was exploited, with a map of how to break this system again. I intend to show the methods used to discover and trace the breach throughout the server. Welcome to part 2 of 3 of my Forensics Analysis blog. At this point in […]