Discussion:
Performing a Post-Mortem Review of a Data Breach Incident
1. Lab Report file including screen captures of the following step(s): Part 1, Step 21; and Part 3, Steps 7 and 11;
2. yourname_Labheaders.txt;
3. yourname_Stream.txt;
4. Lab Assessment file;
5. Optional: Challenge Questions file, if assigned by your instructor.
Lab 4: Exploiting Known Web Vulnerabilities on a Live Web Server
1. Lab Report file including screen captures of the following step(s): Part 2, Steps 8, 14, 19, 38, 50, and 56;
2. Lab Assessment file.