One of the downloaded files to the target system is a scanning tool. Provide the tool name.
# I think, one of the famous tool is nmap. But it is not answer. Wrong Thinking.
# We need to check installed files on log file. There are so many log files. We can filter our friendly tool nmap.
cat dpkg.log | grep "nmap"
When was the last login from the attacker with IP 219.150.161.20? Format: MM/DD/YYYY HH:MM:SS AM
The database displayed two warning messages, provide the most important and dangerous one.
Multiple accounts were created on the target system. Which one was created on Apr 26 04:43:15?
Few attackers were using a proxy to run their scans. What is the corresponding user-agent used by this proxy?
# A daemon log is a program that runs in the background and is essential for system operations. These logs have their own category of logs and are seen as the heart of the logging operations for any system. The path for the system login daemon's configuration is /etc/syslog.
cat daemon.log | grep "mysql" | grep "WARNING"