Basic Approach: Analyzing Files Log For Attacks (2021)

preview_player
Показать описание
I like to do Log file analysis by just using the command prompt, writing on it. But I see a lot of people using programs like Splunk or Elsa. Don't get me wrong, those are great programs, (actually, we have a set of coursewares on how to use programs at InfosecAddicts, on how to use them a get the most from them). But there's always good to start with some regular command basics. In this video, I'll show you how to use some basic commands directly in the command prompt to perform an attack detection. Analyzing files logs to Investigate an Attack | A Basic Approach

📚 Interesting Infosecaddicts Blogpost:

📚 Join Our Free 21 Day hack-a-thon 📚

📚Some Courses you may be interested in📚

✅ Defensive Cyber
✔ Incident Response

✅ Offensive Cyber
✔ Red Team professional

🌐 SOCIAL NETWORKS

----------------------------------------------------------------------------------------
✅ This content is for educational purposes only. InfosecAddicts focuses on training and preparing professionals and enthusiasts, to perform Ethical Hacking, penetration testing tasks focusing on prevention and security, and developing the advancement and discussion of the Cybersecurity Field

🔲 TRADEMARK LEGAL NOTICE: All product names, logos, videos, and brands are the property of their respective owners in the United States and/or other countries. All company, product, and service names used in this video are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.

#attackdetection #pentesting #infosecaddicts
Рекомендации по теме
Комментарии
Автор

This is some real cool tips that actually work.

cottondai
Автор

Hi bro, I am studying Cybersecurity and now I just discovered log files. Very interesting! May you make a video to explain how to check log files in MacBook please? Thanks ❤️

yeayea
Автор

Man this some good damn anlaysis. this is the stuff i need to be learning. taking the CEH on monday

robgenius
Автор

Nice...seems like you have been doing this for a while, great job

ramirez
Автор

please make part 2 of Analyzing Files Log For Attacks longer video

saidibra