<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kape on</title><link>/tags/kape/</link><description>Recent content in Kape on</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 02 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="/tags/kape/index.xml" rel="self" type="application/rss+xml"/><item><title>Web server breached</title><link>/posts/webserver/</link><pubDate>Sat, 02 May 2026 00:00:00 +0000</pubDate><guid>/posts/webserver/</guid><description>&lt;ul>
&lt;li>Reading time : &amp;ldquo;6 min&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h1 id="executive-summary">Executive Summary&lt;/h1>
&lt;ol>
&lt;li>
&lt;p>&lt;strong>Scope.&lt;/strong> A company web server was compromised via the hosted site. The team captured a forensic disk image and a live memory dump in time for offline analysis. Artifacts for this walkthrough: &lt;a href="https://archive.org/details/dfir-case1" target="_blank">archive.org: dfir-case1&lt;/a>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Web layer.&lt;/strong> Apache access and error logs show repeated OWASP-style abuse: SQL injection (including attempted &lt;code>INTO OUTFILE&lt;/code> / upload-style payloads), reflected XSS, local file inclusion / path traversal, and an IDS log-clear request consistent with covering tracks on the app.&lt;/p></description></item></channel></rss>