Halloween 2000: more scary log entries
Continuing last year's Halloween tradition. Five log entries from this year that, on first reading, cost me an hour of stomach-clenched investigation. The lessons each one taught.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged log analysis — 4 results.
Continuing last year's Halloween tradition. Five log entries from this year that, on first reading, cost me an hour of stomach-clenched investigation. The lessons each one taught.
An off-cadence post for the season. Five log entries from this year that, on first reading, cost me an hour of stomach-clenched investigation. The lessons each one taught are durable.
Commercial log-analysis tools cost real money. A Perl script that does 80 per cent of what they do is a few dozen lines. A walk through writing one, with the parts that turn out to matter.
Most security work, in practice, is reading log files. The tools you need are about thirty years old. Here is what I have learnt about driving them.