Day 7
Log analysis ‘Tis the season for log chopping!. This room serves as introduction to Log Analysis
How many unique IP addresses are connected to the proxy server?

Last updated
Log analysis ‘Tis the season for log chopping!. This room serves as introduction to Log Analysis
How many unique IP addresses are connected to the proxy server?

Last updated
How many unique domains were accessed by all workstations?
cut -d ' ' -f3 access.log | cut -d ':' -f1 | sort | uniq -c | sort -n | wc -lWhat status code is generated by the HTTP requests to the least accessed domain?
cut -d ' ' -f3,6 access.log | grep [REDACTED]Based on the high count of connection attempts, what is the name of the suspicious domain?
cut -d ' ' -f3 access.log | cut -d ':' -f1 | sort | uniq -c | sort -n | tail -n 10
This will give 10 domains with the highest connection attempts. What is the source IP of the workstation that accessed the malicious domain?
cut -d ' ' -f2,3 access.log | grep [REDACTED]How many requests were made on the malicious domain in total?
cut -d ' ' -f2,3 access.log | grep [REDACTED] | wc -lHaving retrieved the exfiltrated data, what is the hidden flag?
grep [REDACTED] access.log | cut -d ' ' -f5 | cut -d '=' -f2 | base64 -d