Basics and concepts of information security monitoring

Examining logs exercise 2

Easy
20 min

In this module, we will practice examining logs. Start the lab below and follow the same steps as in the previous module, but use the MySQL log. Then answer the questions. This is a MySQL log file, which may show a possible SQL injection attack. Check if you can see the same from the logs yourself?

Kibana exercise

Investigate the logs in Kibana and answer the questions.

Tervetuloa Cybersecurity-sivustolle. Täällä löydät tietoa turvallisesta verkkokäyttäytymisestä ja vinkkejä tietoturvan lisäämiseksi. Muista aina pitää ohjelmasi ja laitteistosi päivitettyinä sekä välttää epäilyttävien linkkien ja tiedostojen avaamista. Yhdessä voimme tehdä verkosta turvallisemman paikan kaikille käyttäjille.

What time of the day was the first log recorded? - Enter the hours, minutes and seconds HH:mm:ss

On what date were the logs saved? - write in the format yyyy-mm-dd

What percentage of the logs are MySQL queries?

One mysql query has been saved with time stamp 21:43:13.013. What is the value in the mysql_query field?

hakatemia pro

Ready to become an ethical hacker?
Start today.

As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.