> SPLUNK
> //www.splunk.com/
Log analysis tool.
> Attack on password
No.
Somebody filled the security logs with shit, overwriting the original data.
Their systems use circular logging.
Weak.
> Circular logging
The logs are written in "a circle". It writes logs, then overwrites old stuff once it gets to a certain point.
Like a typewriter that has a circular loop of paper in it, erasing and writing-over the paper as it feeds through the machine.
> Accountability is out the window
Fail.
RICO, motherfucker. They're ALL accountable.
> Dubs
> Password requirements
The end-users are too stupid to use complex passwords. It's why most security is just theater.
"Smart" tools do not make their users more intelligent.
> Overwriting logs administratively with a script is proof of intentional tampering
Yes. Yes, it is.