Someone ran a pen-test tool against a production system of mine last night. I realized that I have basically no experience auditing my own systems after an attempted attack to see if anything got through.
Gotta put together a reading list!
Don't have an account? You can sign up here