Dear Experts,
What i want to take help or any hint from you experts is, Can we collect artifacts, or any evidences of attacker who has compromised system using any anonymous proxy or system ???
Which information can we trace for such attacker and how ? any guide or hint.
I am basically MS Information Security Students, need help in this regard regarding my digital forensic course work
I could not find any relevant material from internet, journals or through forums
Thanks
Hi Dear,
First of all, I would like to appreciate you for the very logical question that you have asked. D
Secondly, to help you out with this, I would suggest you to go for some R & D work over "DNS Leaking". Here you can easily obtain all the answers of your unanswered questions.
Regards