CyberTactics

We are working hard to collect all tactical cyber lesson for your knowledge and experience.

Log Analysis - IIS Logs

Internet Information Service Logs (IIS)
HTTP Result Codes
1xx – Informational
2xx – Successful
3xx – Redirection
4xx – Client Error

5xx – Server Error

Table 1. HTTP status codes from the Web crawler






Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Archive

  • ▼  2015 (39)
    • ▼  September (39)
      • Proxy Logs - HTTP
      • Analysis Proxy Logs
      • Log Analysis – VPN & Radius Logs
      • Router & Switch Logs
      • DHCP Logs Analysis : DNS Unauthorized Network Exte...
      • DHCP Logs Analysis : DNS Multiple IPs
      • Analysis DHCP Logs
      • Analysis – DNS Logs: Hi-Jacking
      • DNS Logs (Malware) Example #2- Intrusion
      • DNS Log Analysis
      • Infrastructure Logs and Overview
      • Windows Firewall Logs: Analysis Suspected logs
      • Analysis Windows Firewall Logs
      • Windows Firewall Logs
      • Windows Event Logs
      • Other Apache Logs
      • Log Analysis – Apache Logs
      • Log Analysis – Apache Logs : Access Log
      • Apache and Its Logs
      • Log Analysis - IIS Logs
      • Log Analysis
      • Understanding Common Log Attributes
      • Programs for Log Analysis
      • Analyzing Logs
      • What can logs do for?
      • What’s Logging?
      • Covert_TCP
      • Reverse WWW Shell (HTTP)
      • ICMP Tunnel / ICMPTX
      • Covert Channels (Tunneling)
      • Covert Channels
      • Alternate Data Streams (NTFS)
      • Creating Hidden Files in Windows
      • Creating Hidden Files and Directories in UNIX
      • Unix Shell History Files
      • Altering Accounting Files in Unix
      • Altering System Logs in Unix
      • Altering Event Logs in Windows
      • Hiding Evidence by Altering Logs
CyberTactic. Simple theme. Powered by Blogger.