Sharing our logging knowledge. A place we log our insights, experiences, and findings as it pertains to the world of logs.
What is the slince_golden WordPress backdoor? Detailed analysis of repeated attacks targeting fake WordPress files using the 'slince_golden' backdoor parameter.
Learn how to interpret WPScan log entries and harden your WordPress environment against automated vulnerability scans.
An examination of web scanning techniques, risks associated with exposed private files, and essential best practices for secure development.
How to troubleshoot remote syslog with tcpdump. rsyslog, syslog-ng, linux, ubuntu, red hat, centos
Understanding the syslog protocol. The facilities, levels and how it works.
This article explains the differences between the different syslog daemons: syslogd, rsyslog and syslog-ng, found in Linux and BSD distributions.
NGINX is a powerful web server and logging is a critical piece to managing a web server. In this article we explain the two log types: access and error, and how to work with them.
In this article we explain the two log types: access and error, and how to work with them.
Recovering files deleted by mistake on Linux/Ubuntu using PhotoRec
Explore the differences between SIM (Security Information Management), SIEM (Security Information and Event Management), log management, and log analysis, with practical examples and actionable insights.
Discover how to identify out-of-band interactions in web server logs, understand their significance, and utilize log analysis, log management, and SIEM tools to enhance security.
Out-of-band interactions are used to detect vulnerabilities that cause external interactions. Interactsh is an open source tool for detecting them.
14 days free trial. No credit card required.