compromised server / time exploiting web applications / web root / negative media / particular server / social engineering tool / fraudulent site / remote systems / legitimate site / vulnerable web application / law enforcement / shell server / search string history / web access logs / Internet crime / web server process / accessible shell server / fraudulent web site / /