
Sign up to save your podcasts
Or
INVESTIGATING SERVER LOGS
In many cyber crime cases especially in web defacement analysis of File Transfer Protocol (FTP) and web server logs yields the most crucial evidence – the IP address of the suspect. Website defacement is usually the substitution of the original home page of a website with another page. In most of the web defacement cases the home page of the website is replaced with a pornographic or defamatory page.
Featuring "keycybr" CI&R Intern "Jaydev Joshi". He is pursuing B.Tech from Atmiya university. Also he is a core team member of The Hackers meetup and Anti cyber crime society. He is an enthusiastic towards the field of Open source Intelligence and cyber crime investigation
Get in touch with him - https://www.linkedin.com/in/jaydev-joshi/
INVESTIGATING SERVER LOGS
In many cyber crime cases especially in web defacement analysis of File Transfer Protocol (FTP) and web server logs yields the most crucial evidence – the IP address of the suspect. Website defacement is usually the substitution of the original home page of a website with another page. In most of the web defacement cases the home page of the website is replaced with a pornographic or defamatory page.
Featuring "keycybr" CI&R Intern "Jaydev Joshi". He is pursuing B.Tech from Atmiya university. Also he is a core team member of The Hackers meetup and Anti cyber crime society. He is an enthusiastic towards the field of Open source Intelligence and cyber crime investigation
Get in touch with him - https://www.linkedin.com/in/jaydev-joshi/