You have just received an indication about a data leak from your companys systems administrator that a dump containing credit cards details is published on a carding forum. You were informed that the leaked information is from your database server.
In this exercise, you will need to trace the origin of the attack by investigating different logs, identify the vulnerability used by the attacker, detect the exact information that was leaked, remediate the vulnerability and mitigate the attack.
You have just received an indication about a data leak from your companys systems administrator that a dump containing credit cards details is published on a carding forum. You were informed that the leaked information is from your database server.
In this exercise, you will need to trace the origin of the attack by investigating different logs, identify the vulnerability used by the attacker, detect the exact information that was leaked, remediate the vulnerability and mitigate the attack.