[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200611131717.07136.beSIRT@beyondsecurity.com>
Date: Mon, 13 Nov 2006 17:17:06 +0200
From: beSIRT <beSIRT@...ondsecurity.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Team Evil - Incident #2
Earlier this year, Beyond Security’s beSIRT released an incident response
forensic analysis of a defacement attack by Team Evil [Team Evil Incident
(Cyber-terrorism defacement analysis and response)]. The PDF itself can be
found here:
http://www.beyondsecurity.com/besirt/advisories/team-evil-incident.pdf
A follow up is being released today, on a second incident. Following what Team
Evil did, their methodology and how it changed since the first document was
released.
The aim of this document is more to show how such analysis is done, on an
educational note. The PDF can be found here:
http://beyondsecurity.com/besirt/advisories/teamevil-incident2.pdf
We hope you find this useful.
beSIRT, Beyond Security.
Powered by blists - more mailing lists