Know Your Enemy: II

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap.

Read the paper in HTML format here.