Know Your Enemy: II

Data from over 200 Pen Tests Shows Most Common Vulnerabilities. Learn more now.

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap.

Read the paper in HTML format here.