Deception and Forensics for the Next Generation – Part 7: Device Forensics in a Deception Environment
SecureWorld News
AUGUST 29, 2020
Our decoy is a Windows server 2008 with nothing particularly special about it beyond the fact that it is configured as a decoy. The other thing that we need to know about the decoy is its architecture within the deception network. It is clear that the attacker knows MS Server 2008, but he is not very careful.
Let's personalize your content