Log Analysis

Networks, computers, and other IT systems generate audit trial records or logs that document system activities.  These logs also can tell what a hacker was doing in a particular system.  Log analysis helps businesses understand user behavior comply with security polices, audits, and regulations.


Log Analysis Practices

Pattern detection and recognition


Tagging and classification

Correlation analysis

Artificial Ignorance

 List of some log analysis tools

  1. Kali Linux
  2. Spreadsheets
  3. Command Line
  4. Splunk
  5. Zeek

 Here are some video links about Password Cracking:

Log Analysis
Beginners Guide to Log Analysis

 Additional Links and practice CTFs:

Powered by National University

%d bloggers like this: