Learning Logs

Sharing our logging knowledge. A place we log our insights, experiences, and findings as it pertains to the world of logs.

Articles

Latest Articles

Jun 3, 2025
trunc_team
Investigating the 'slince_golden' WordPress Backdoor

What is the slince_golden WordPress backdoor? Detailed analysis of repeated attacks targeting fake WordPress files using the 'slince_golden' backdoor parameter.

May 30, 2025
trunc_team
Vulnerability Scanner Logs: WPScan

Learn how to interpret WPScan log entries and harden your WordPress environment against automated vulnerability scans.

May 27, 2025
trunc_team
Web Scanning, Development Hygiene, and File Exposure Risks

An examination of web scanning techniques, risks associated with exposed private files, and essential best practices for secure development.

May 16, 2025
Daniel Cid (@dcid)
Troubleshooting Remote Syslog with TCPDUMP

How to troubleshoot remote syslog with tcpdump. rsyslog, syslog-ng, linux, ubuntu, red hat, centos

May 16, 2025
trunc_team
Logging basics: Syslog protocol in detail

Understanding the syslog protocol. The facilities, levels and how it works.

May 16, 2025
Daniel Cid (@dcid)
Syslog Daemons difference (syslogd, rsyslog and syslog-ng)

This article explains the differences between the different syslog daemons: syslogd, rsyslog and syslog-ng, found in Linux and BSD distributions.

May 16, 2025
Tony Perez (@perezbox)
A Guide to: NGINX Logs

NGINX is a powerful web server and logging is a critical piece to managing a web server. In this article we explain the two log types: access and error, and how to work with them.

May 16, 2025
Daniel Cid (@dcid)
A Log Guide to: Apache Logs

In this article we explain the two log types: access and error, and how to work with them.

Jan 4, 2025
Daniel Cid (@dcid)
Recovering files deleted by mistake on Linux/Ubuntu

Recovering files deleted by mistake on Linux/Ubuntu using PhotoRec

Nov 21, 2024
trunc_team
Difference Between SIM, SIEM, Log Management, and Log Analysis

Explore the differences between SIM (Security Information Management), SIEM (Security Information and Event Management), log management, and log analysis, with practical examples and actionable insights.

Nov 21, 2024
trunc_team
Detecting Out-of-Band Interactions with Log Analysis and SIEM Tools

Discover how to identify out-of-band interactions in web server logs, understand their significance, and utilize log analysis, log management, and SIEM tools to enhance security.

Nov 21, 2024
trunc_team
Oast - Out-of-band interactions in your web server logs

Out-of-band interactions are used to detect vulnerabilities that cause external interactions. Interactsh is an open source tool for detecting them.

Simple, Affordable, Log Management and Analysis.

14 days free trial. No credit card required.