CyberTactics

We are working hard to collect all tactical cyber lesson for your knowledge and experience.

Programs for Log Analysis


  • Perl
  • Awk / Sed
  • SQL 
  • Oracle
  • MS Access / Excel
  • 3rd Party Programs – (Web Trends, Calamari, HP Open View, etc)
  • Analysis Appliances – (Niksun, SNORT, etc)
  • Built in Auditing Tools (Cisco, Active Directory)
  • Forensic Tools – (Encase, FTK, etc)


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Archive

  • ▼  2015 (39)
    • ▼  September (39)
      • Proxy Logs - HTTP
      • Analysis Proxy Logs
      • Log Analysis – VPN & Radius Logs
      • Router & Switch Logs
      • DHCP Logs Analysis : DNS Unauthorized Network Exte...
      • DHCP Logs Analysis : DNS Multiple IPs
      • Analysis DHCP Logs
      • Analysis – DNS Logs: Hi-Jacking
      • DNS Logs (Malware) Example #2- Intrusion
      • DNS Log Analysis
      • Infrastructure Logs and Overview
      • Windows Firewall Logs: Analysis Suspected logs
      • Analysis Windows Firewall Logs
      • Windows Firewall Logs
      • Windows Event Logs
      • Other Apache Logs
      • Log Analysis – Apache Logs
      • Log Analysis – Apache Logs : Access Log
      • Apache and Its Logs
      • Log Analysis - IIS Logs
      • Log Analysis
      • Understanding Common Log Attributes
      • Programs for Log Analysis
      • Analyzing Logs
      • What can logs do for?
      • What’s Logging?
      • Covert_TCP
      • Reverse WWW Shell (HTTP)
      • ICMP Tunnel / ICMPTX
      • Covert Channels (Tunneling)
      • Covert Channels
      • Alternate Data Streams (NTFS)
      • Creating Hidden Files in Windows
      • Creating Hidden Files and Directories in UNIX
      • Unix Shell History Files
      • Altering Accounting Files in Unix
      • Altering System Logs in Unix
      • Altering Event Logs in Windows
      • Hiding Evidence by Altering Logs
CyberTactic. Simple theme. Powered by Blogger.