- Hands-On Network Forensics
- Nipun Jaswal
- 84字
- 2021-06-24 16:04:17
Domain controller/authentication servers/ system logs
Authentication servers can allow an investigator to view login attempts, the time of the login, and various other login-related activities throughout the network. Consider a scenario where a group of attackers tries to use a compromised host to log into the database server by using the compromised machine as a launchpad (pivoting). In such cases, authentication logs will quickly reveal not only the infected system, but also the number of failed/passed attempts from the system to the database server.