Networks, computers, and other IT systems generate audit trial records or logs that document system activities. These logs also can tell what a hacker was doing in a particular system. Log analysis helps businesses understand user behavior comply with security polices, audits, and regulations.
Functions
Log Analysis Practices
Pattern detection and recognition
Normalization
Tagging and classification
Correlation analysis
Artificial Ignorance
List of some log analysis tools
- Kali Linux
- Spreadsheets
- Command Line
- Splunk
- Zeek
Here are some video links about Password Cracking:
Additional Links and practice CTFs: