A security analyst is investigating a data leak on a corporate website. The attacker was able to dump data by sending a crafted HTTP request with the following payload:
Which of the following systems would most likely have logs with details regarding the threat actor's requests?
Carole
11 months agoLettie
11 months agoJeanice
12 months agoLashawn
12 months agoLeota
1 years agoStephanie
1 years agoDominque
1 years agoGwen
1 years agoShawna
1 years agoPansy
1 years agoLeota
1 years ago