This scenario serves as a challenge on:
Defending and responding to outsider attacks.
OBJECTIVES AND OUTCOME:
The objective of this challenge is to:
– Review network traffic logs
– Review web application logs
– Find and fix vulnerabilities in web application source code
In order to get the full benefits of this Challenge ,it is suggested that you have competencies in the following areas:
– System Administration
– Analyzing network traffic logs
– Analyzing Apache logs
– Web Application security vulnerabilities
This scenario was created by Walter Donato, Simon Loizides, Marios Nicolaides, RED RED and Sathish Govindharajan.