Disclaimer: I have no intention of detailing how the box was exploited, with a map of how to break this system again. I intend to show the methods used to discover and trace the breach throughout the server. Welcome to part 3 of 3 of my Forensics Analysis blog. Following the first 2 parts of […]