It’s a hard life for phishers…

Phishing URL compromise is surprisingly common, as many phish pages are fully expected to have a short shelf life. Of course, having a site taken down isn’t the only thing making life difficult for phishers. As you’ll see, it’s often the least of their… Continue reading It’s a hard life for phishers…

Web Application Log Forensics After a Hack

Sites get hacked, it’s not pleasant but it happens. A critical part of it, especially in my experience, has been the web application log forensics applied directly after an attack. You can usually piece together what happened, especially if the attacker doesn’t rotate IP addresses during the attack. With a little poking around and after…

Read the full post at darknet.org.uk

Continue reading Web Application Log Forensics After a Hack