Basics and concepts of information security monitoring

Examining logs exercise 3

Easy
20 min

This module focuses on practicing log investigation. Start the lab below and follow the same steps as in the previous module, but use HTTP logs. Then answer the questions. In the previous module, the SQL database was in use in connection with this HTTP service. Can you deduce in which file the SQL injection is located?

Kibana exercise

Investigate the logs in Kibana and answer the questions.

Tervetuloa turvallisuuteen!

What percentage of HTTP requests are with the POST method? - just write the number.

An SQL injection has been detected in the logs' HTTP service, which was also seen in the SQL log of the previous module. Can you guess in which file the SQL injection is located?

From which IP address have the queries taken place?

What is the IP address of the HTTP service?

Which HTTP status code has been used the most?

hakatemia pro

Ready to become an ethical hacker?
Start today.

As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.