beSIRT
18/11/06, 14:37
Earlier this year, Beyond Security=E2=80=99s beSIRT released an incident re=
sponse=20
forensic analysis of a defacement attack by Team Evil [Team Evil Incident=20
(Cyber-terrorism defacement analysis and response)]. The PDF itself can be=
=20
found here:=20
http://www.beyondsecurity.com/besirt/advisories/team-evil-incident.pdf
A follow up is being released today, on a second incident. Following what T=
eam=20
Evil did, their methodology and how it changed since the first document was=
=20
released.
The aim of this document is more to show how such analysis is done, on an=20
educational note. The PDF can be found here:
http://beyondsecurity.com/besirt/advisories/teamevil-incident2.pdf
We hope you find this useful.
beSIRT, Beyond Security.
sponse=20
forensic analysis of a defacement attack by Team Evil [Team Evil Incident=20
(Cyber-terrorism defacement analysis and response)]. The PDF itself can be=
=20
found here:=20
http://www.beyondsecurity.com/besirt/advisories/team-evil-incident.pdf
A follow up is being released today, on a second incident. Following what T=
eam=20
Evil did, their methodology and how it changed since the first document was=
=20
released.
The aim of this document is more to show how such analysis is done, on an=20
educational note. The PDF can be found here:
http://beyondsecurity.com/besirt/advisories/teamevil-incident2.pdf
We hope you find this useful.
beSIRT, Beyond Security.