Discover how Unix artifact collectors reveal hidden exploitation attempts in HTTP and Tomcat logs. Essential for digital forensics and security analysis. #UnixTools #Cybersecurity #LogAnalysis #DigitalForensics #BSidesFrankfurt
Show transcript [en]
We collected most of the artifacts using Unix the Unix artifact extricctor collector. Uh so the primary artifacts that you will find on these appliances are for one the HTTP server logs or Tomcat logs which show the um exploitation attempts.