More Forensic Analyis

To go with Dana’s presentation /. linked to a good article on analyzing a spam compromise where a machine was attacked and used to send spam. This article goes through the detection and analysis. Very interesting!

One Comment on “More Forensic Analyis”

  1. I posted this link a couple of days ago: http://blogs.ittoolbox.com/security/
    Basically a set of twelve blog entries (links on the right side of the page) tracking down a spammer who happened to be somebody internal (like a janitor or something) who dropped of a wireless laptop in a convenient location. I read the last couple of parts, but didn’t have time to go further back.