Latest Hacking,Hacker News for Hackers and Hacking and Secuirty Community

Latest Hacking News for Hacker News for Security Guys

dam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?

1 min read

Leave a Reply

Your email address will not be published. Required fields are marked *