August 15th, 2006, 05:54 PM
Trealin, you're right for the most part, that being the part about files being crafted specifically to make use of a vulnerability.
Another prime example is the WMF exploit (my favorite) for...
August 15th, 2006, 05:15 PM
In most cases corporates have those ports open accross their networks as they are used for authenticating to domain controllers and accessing file server shares and what nots.
Ideally the ports...
August 15th, 2006, 04:50 PM
By the sounds of things you could probably make do with a summary version of the logs which is quite an easy way of identifying patterns in the log files.
Consdering that I've seen no mention of...