||Oracle Tips by Burleson
Chapter 5 -
All About Cybercrime
Real World Case: Website
He joked out loud to himself that he liked it, but deep
down inside he felt really scared. He immediately had the header
replaced and then sat back to plan his next step. Having one’s
personal space violated, whether it’s a home burglary or a website
invasion leaves one feeling violated and angry.
He decided that he was going to make this a
learning experience and understand exactly what happened, how they
did it, and how the FBI would respond to the crime. To start, he
accessed the File Transfer Protocol (FTP) log file on his web
server. He discovered:
The attacker entered by web domain at 5:38
a.m. using a valid password.
The attacker FTP’d a copy of the altered
The attacker downloaded the secure
directory with an eCommerce shopping cart.
The following is a representation of what his
FTP log looked like:
Wed Jul 28 05:47:32 2004
 To 6184.108.40.206( dba-admin.com )
 From modemcable004.85-202-24.mc.video.ca( 220.127.116.11 ).
 PWD FEAT
 REST 100
 REST 0
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA
Copyright © 1996 - 2014 by
Burleson. All rights reserved.
Oracle® is the registered trademark
of Oracle Corporation.