Deception and Forensics for the Next Generation — Part 5: Phantom Attacker
SecureWorld News
AUGUST 2, 2020
The thing that jumps out at me is the operating system because there is no VoIP running on our test network. First, the attacker could be a rogue machine running a VoIP OS. Another possibility is that it is a legitimate device that just happens to be running VoIP. Figure 11 - Deception Net Log Showing a Failed Login Attempt.
Let's personalize your content