Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Welcome back to the course, but now it's time to say we are done
00:04
after the last video that we talked about. All this also flogs like i ps ideas
00:10
in my application. Faro.
00:13
In this video, we'll d'oh! Of course summary.
00:16
This was a basically course.
00:18
The Miami Jai off this course waas Each of those log analysis
00:24
This is today the where applications are present in our lives. It waas a good way to start til organizes.
00:32
This course was builds thinking on
00:34
bro. Teamers are the fenders
00:37
and also this off analysts.
00:40
Let's see a brief review off the course stocks.
00:44
We had two modules in our course. The first was the introduction in a review.
00:50
We started with the course introduction, followed by a Web application review.
00:56
Where we talked about were replication components like Webb seven in clients.
01:00
After we talked about a really important component, the Web seven.
01:06
We talked about Apache and Jax, and I s
01:11
also in this lesson. We talked about Web several logs
01:15
and you conclude the module on. We give some advice is about Hutch perform a good analysis, and also some will organize his mistakes. Errors
01:26
the mother too, were the model to the Logan dances.
01:29
The first stop off the mortar Jew
01:32
WAAS Web application attacks, which cost about durability attacks and over I stopped in project.
01:41
In this course, we use a desperation 2017 off the watch stopped in project.
01:46
The important thing here is even if they watch stopped in large a new version they formation about these attacks will not change.
01:55
Some vulnerability in attacks became less popular
01:57
and maybe
02:00
a new type of attacks could be found.
02:01
That's why is important to understand the Web. Several logs.
02:06
After this introduction, we started talking about the attacks
02:10
without abilities Canes,
02:13
brute force attacks,
02:15
a scare injection file inclusion Gross. I'd scream teen
02:20
cross eyed request forgery
02:22
for each of these attacks. We gave some directions. How do they find them?
02:27
For example, Use their agent in hell payloads.
02:30
But don't forget that, http Requests can be corrected.
02:36
Remember to understand what the law means, What the law I want to say to you. Remember the questions who, what and when?
02:44
Look for key components off the love like the I P address. And don't worry if you do not understand
02:51
all the luck, feuds.
02:53
Logan has the skills improve with practice. See
02:57
more Logan, as you do, better you be.
03:00
And after all these attacks, in log analogies, we talked about recipe and http flowed and we discussed it. How did they find them?
03:09
And to finish the course, we talked about it. You're really important to that. Helps some analysts
03:16
i p s or R G s and the Web application fire. Oh,
03:21
to finish some final words.
03:23
Many people happened me during this course,
03:27
but I would like to do a special mention
03:30
23 teaching assistant that assisted me with this course.
03:34
Jenna, Harvey and Stephen.
03:37
Thanks, guys. I really appreciate all the help.
03:39
Final things. So all the cyber, the stash.
03:44
And now thanks for watching this course. I really enjoyed the time there has been doing this course.
03:49
I hope that you like this course as much as I enjoy doing it
03:53
and also hope that this course improve your knowledge and motivated you to keep learning
04:00
to keep learning. Check cyber catalog. There are many great courses on it.
04:04
And if you have any questions, suggestions or doubts, feel free to contact me.
04:10
I think so. And see you on the next course.

Identifying Web Attacks Through Logs

This course will review web application infrastructure, web servers, and the logs associated with them. We will also simulate 10 attack scenarios and identify the attack through logs that are generated by the web server.

Instructed By

Instructor Profile Image
Igor Vieira
Information Security Analyst
Instructor