On the heels of a massive coordinated cyberattack, a multinational corporation called upon the services of veteran forensic investigator, Lisa. The attack infiltrated their MSSQL servers, and Lisa suspected the breach was a result of a sophisticated SQL Injection method that was executed from multiple sources and locations simultaneously. To determine the attack ' s origin, Lisa needs to not only collect but also examine the evidence files on the MSSQL server. To cope with the breach ' s scale and sophistication, which tool should Lisa rely on?
Submit