A security analyst is investigating a data leak on a corporate website. The attacker was able to dump data by sending a crafted HTTP request with the following payload:
Which of the following systems would most likely have logs with details regarding the threat actor's requests?
Carole
10 months agoLettie
11 months agoJeanice
11 months agoLashawn
11 months agoLeota
12 months agoStephanie
12 months agoDominque
12 months agoGwen
12 months agoShawna
12 months agoPansy
12 months agoLeota
12 months ago