A security analyst is investigating a data leak on a corporate website. The attacker was able to dump data by sending a crafted HTTP request with the following payload:
Which of the following systems would most likely have logs with details regarding the threat actor's requests?
Carole
11 months agoLettie
11 months agoJeanice
11 months agoLashawn
12 months agoLeota
1 years agoStephanie
1 years agoDominque
1 years agoGwen
12 months agoShawna
12 months agoPansy
1 years agoLeota
1 years ago