Sharing our logging knowledge. A place we log our insights, experiences, and findings as it pertains to the world of logs.
Trunc provides a list of SQLi attacks in the wild. Honeypots records over 900 SQL injection attempts.
Critical logs to watch: Alerting on read-only filesystem errors
Some logs require immediate response to prevent a breach or to recover a broken system. Today's critical logs are the PHP fatal errors.
The OSSEC HIDS platform is a popular log collection and analysis platform, this article shows how you can implement a web interface for the OSSEC platform.
OSSEC Log Analysis - How to get your OSSEC logs into a centralized dashboard in the cloud.
Microsoft Office365 (Azure-based) offers a very powerful audit trail of Exchange email logs. In this guide, we will explain how they look like and what to take from them.
Log management is difficult because of the shear scope of devices that need to be monitored.
Investigating and recovering a compromised Linode server running WordPress and latest Ubuntu.
HTTP User agents are a big part of how browsers and web servers communicate. In this article, we cover what they are and the most common user agents.
Analysis of a HTTP Flood - DDoS - that happened against a site that we were monitoring.
Everything you probably don't need to know about NGINX error logs.
Understanding the logs from Dropbear, a SSH server meant for low memory systems. Useful to understand the logs from your routers, including OpenWrt, Ubiquiti, Unifi, etc.
14 days free trial. No credit card required.