Hunting Hackers via Log Analysis!

preview_player
Показать описание
In this video, we analyze the access logs of a compromised Nginx web server. Can you correctly identify the method of enumeration and initial exploitation by the attacker?

Enjoy!
----
This content is intended for educational purposes only. All demonstrations and techniques shown are designed to teach ethical hacking and improve cybersecurity. Any use of the information provided in these videos is done at your own risk and should be used responsibly. Unauthorized hacking, illegal activities, or violations of privacy are not endorsed or encouraged. Always ensure you have proper authorization before attempting any security testing or hacking.
Рекомендации по теме
Комментарии
Автор

Perfect! I’m studying now for CySA+ now and log analysis is something I want to take a deeper dive into. Thanks, Tyler!

kimberlycanfixit
Автор

Nice to see! Would love to see you do a video on ETW log analysis (kernel level monitoring) sometime :)

SatoshiSky
Автор

Thanks for the education, about to get to that room on THM now..😅

TureIMasterEquality
Автор

you should know that heath Adams released the first 15 hours from the course on his Channel .

haymmor
Автор

Great vid, how did you get tryhack me on dark mode?

python