filmov
tv
Basic Approach: Analyzing Files Log For Attacks (2021)

Показать описание
I like to do Log file analysis by just using the command prompt, writing on it. But I see a lot of people using programs like Splunk or Elsa. Don't get me wrong, those are great programs, (actually, we have a set of coursewares on how to use programs at InfosecAddicts, on how to use them a get the most from them). But there's always good to start with some regular command basics. In this video, I'll show you how to use some basic commands directly in the command prompt to perform an attack detection. Analyzing files logs to Investigate an Attack | A Basic Approach
📚 Interesting Infosecaddicts Blogpost:
📚 Join Our Free 21 Day hack-a-thon 📚
📚Some Courses you may be interested in📚
✅ Defensive Cyber
✔ Incident Response
✅ Offensive Cyber
✔ Red Team professional
🌐 SOCIAL NETWORKS
----------------------------------------------------------------------------------------
✅ This content is for educational purposes only. InfosecAddicts focuses on training and preparing professionals and enthusiasts, to perform Ethical Hacking, penetration testing tasks focusing on prevention and security, and developing the advancement and discussion of the Cybersecurity Field
🔲 TRADEMARK LEGAL NOTICE: All product names, logos, videos, and brands are the property of their respective owners in the United States and/or other countries. All company, product, and service names used in this video are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
#attackdetection #pentesting #infosecaddicts
📚 Interesting Infosecaddicts Blogpost:
📚 Join Our Free 21 Day hack-a-thon 📚
📚Some Courses you may be interested in📚
✅ Defensive Cyber
✔ Incident Response
✅ Offensive Cyber
✔ Red Team professional
🌐 SOCIAL NETWORKS
----------------------------------------------------------------------------------------
✅ This content is for educational purposes only. InfosecAddicts focuses on training and preparing professionals and enthusiasts, to perform Ethical Hacking, penetration testing tasks focusing on prevention and security, and developing the advancement and discussion of the Cybersecurity Field
🔲 TRADEMARK LEGAL NOTICE: All product names, logos, videos, and brands are the property of their respective owners in the United States and/or other countries. All company, product, and service names used in this video are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
#attackdetection #pentesting #infosecaddicts
Комментарии