INFORMATION IN THIS CHAPTER:
Summary of an unsophisticated attack
Live response
Memory analysis of advanced attacks
Filesystem analysis of advanced attacks
Leveraging MySQL
Reporting to the client