forensicsPromedium
Investigation
taipanbyte
Task: Analyze web server access.log to identify cyberattack traces and extract compromise artifacts. Solution: HTTP status code analysis revealed SELECT instead of numeric codes due to SQL injection breaking log parsing; extracted hex values from UNION SELECT CHAR() payloads and decoded to flag.
$ ls tags/ techniques/
log_analysishex_decodingstatus_code_anomaly_detectionsqli_pattern_recognitionchronological_reconstruction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Bitrixxx— taipanbyte
- [pentest][Pro]Кибервоин (Cyberwarrior)— hackerlab
- [web][Pro]Базовая авторизация 3 — HackerLab— hackerlab
- [web][Pro]Запретный код 2 (Forbidden Code 2) — HackerLab— hackerlab
- [forensics][Pro]Log Hunter— hackerdna