Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'log'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 15 results

  1. [hide][Hidden Content]]
  2. Public Checker by Kidjomba How to use: 1. Install PyQt5: pip3 install PyQt5 2. Run main.py: python3 ./main.py 3. Make logs database: 3.1 Select logs dir with "SelectOwn" 3.2 Select where to save Hast.txt file with "MakeHashes" 4. Checking logs for Private/Public: 4.1 Select created hash file with "Hash File" button 4.2 Select folder with Logs u whant to check with "Logs Folder" 4.3 Click "Process" 5.1 Save Private logs in another folder with "Save Private" 5.2 Save Public logs in another folder with "Save Public [hide][Hidden Content]]
  3. Fix Version. Easy to use just follow the "FollowMe.txt" under Usage folder. Required: - Wallet logs of metamask under your own results of stealer do not use public logs they are already fucked up. Lastly if you want to donate just PM me i will appreciate any support from anyone. [hide][Hidden Content]]
  4. Learn web server log analysis and identify malicious traffic. Description Some Important Questions. Are you curious on how an attack pattern looks when a web application is under a malicious attack? Are you interested in knowing the basics of attack detection and what tools and techniques are used when we want to detect an attack on a web application or an authentication service like SSH or FTP? Do you want to develop a basic skillset on reading and deciphering the interesting information in logs & add value to your existing skills? You could be an application developer, a network administrator, a security professional who would like to gain the skills to detect and pinpoint attacks by malicious actors and protect your web applications. About the course This course is designed with a sole purpose to educate learners about the immense value the web server and authentication logs or logs in general store and how the information in these logs can be helpful to detect any ongoing attack that your webserver or authentication service might be under. Or an attack that already have taken place. This course explains the basics of web servers and how the logging is done on the web servers default logging locations. We also explain about the structure of logs & default logging locations for the widely used web servers - Apache, Nginx & Microsoft IIS. Authentication servers like SSH & FTP as these too often come under bruteforce attack. Course teaching methodology We focus on both theoretical & practical aspects of log analysis. So we work in both the ways - as an attacker who would try to attack the application / SSH / FTP services & a defender, who will analyse the logs using multiple tools and visualise how the logs of an application under attack can look like. We setup a test environment with a victim machine and an attacker machine and generate both normal and malicious traffic and then use the generated logs to investigate the common attack pattern and learn the typicality of an attack and educate ourselves on how the attacks look in the logs and appreciate how logs store valuable information which is often overlooked. This will ensure that learners will get hands-on experience on the concept of log analysis and utilise this basic skillset in their day-to-day security or administrative tasks & activities. We also discuss about the best practices from multiple standard sources that can be implemented to ensure that the logging is done at an optimum level and stay vigilant. By the end of the course, you will gain a foundational understanding on: Grasp the basics of logging concepts, its importance and standard log formats & log storage location for web servers like Apache, Nginx & Microsoft IIS. Authentication services like SSH & FTP. Identify the Malicious traffic that gets logged and ascertain if the application / service is under active attack or has been attacked and learn about the potential point of attack. Gain a broad insight on best logging practices as per the OWASP guidelines and develop an understanding on ways in which you can implement a robust logging for your IT assets. Gain an overall thought process for analysing any of the logs of system and troubleshoot and pinpoint an issue. Who this course is for: Cyber Security professionals who want to learn to detect attacks from logs. Network administrators wanting to develop basic skills for log analysis. Application Developers - wanting to quickly detect security issues that might be occuring. Students wanting to enhance their knowledge in log analysis. [Hidden Content] [hide][Hidden Content]]
  5. Ultimate Log Parser Almost full-fledged log parser , functionality: - Mass upload (to file/to clipboard): -- Emails -- Passwords -- Usernames -- Discord Tokens - Spot search: -- Search for logs by matching string - request -- Selection in the Url, User, Pass, Cookies, UserInfo format on request - Uploading Logs with a request to a separate folder - Uploading a selection to a separate folder in the Log Id format: LoginData.txt / Cookies.txt / UserInfo.txt -- The software also checks Emails for compliance with the format -- So far, it only supports the Redline format Additional functionality: -- GUI -- Remove Duplicates (Across all fields) [Hidden Content]
  6. Security Onion Security Onion is a free and open-source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Changelog v2.3.170 FEATURE: Events table(s) for Windows Events matching default view #8591 FEATURE: Split the winlog.event_data.Hashes field for Windows sysmon process creation events. #8593 FIX: Mapping error when trying to index Strelka logs generated from ELF files. #8592 UPGRADE: Elastic 8.4.1 #8794 UPGRADE: Zeek 4.0.9 #8774 [hide][Hidden Content]]
  7. El programa revisa todas las carpetas del directorio base y mira todas las demás carpetas con registros para la disponibilidad de los servicios (sitios) que necesitamos. Registra escrituras en un archivo o en diferentes archivos correspondientes al nombre del servicio. 1.- Poner los Logs (carpetas) en base 2.- services.txt es el archivo que busca todos los registros ustedes pueden modificarlo. Buscando resultados Carpeta log Registros [hide][Hidden Content]]
  8. [hide][Hidden Content]] seed_parser_v2.2 + MANUAL [hide][Hidden Content]]
  9. Utility for cleaning the logs from any executable files. Drag-and-drop (not archives), the program will remove (without launching or reading) the following files: ".exe", ".bat", ".scr", ".lnk", ".bin", ".cmd", ".js", ".jse", ".gadget", ".jar", ".msi", ".wsf", ".vbs", ".ps1", ".app", ".vb", ".hta" [hide][Hidden Content]]
  10. Security Onion is a free and open-source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Changelog v2.3.110 FEATURE: Full ECS data type compliance #6747 FEATURE: Intrusion Detection Honeypot Node #7138 FEATURE: Multi-Factor Authentication (MFA) for Security Onion #7316 FEATURE: Populate Zeek’s networks.cfg with $HOME_NET #6854 FEATURE: SOC authentication logs will now be ingested into Elasticsearch #7354 FEATURE: sort indices list alphabetically by index name #6969 FIX: ACNG should clear the cache on restart #7114 FIX: Abort so-user sync if Kratos database is locked #7459 FIX: Add Endgame Index settings to the global.sls on new installs #7293 FIX: Allow downgrades during docker_install #7228 FIX: Avoid telegraf apparmor issues #2560 FIX: Composable Templates #4644 FIX: Increase minimum password length from 6 to 8 characters #7352 FIX: Navigator should ship with all needed files #1162 FIX: Prevent Elasticsearch deprecation notices from causing installation failures #7353 FIX: Random passwords generated at setup contain character combinations that cause problems with some containers #7233 FIX: curator should exclude so-case* indices #7270 FIX: so-ip-update needs to update Kibana dashboards #7237 FIX: so-status TTY improvements #7355 UPGRADE: Elastic 7.17.1 #7137 UPGRADE: FleetDM to 4.10.0 #7245 UPGRADE: Grafana 8.4.1 #7281 UPGRADE: Kratos 0.8.2-alpha.1 #7351 [hide][Hidden Content]]
  11. Phant0m | Windows Event Log Killer Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process in order to reduce resource consumption. Grouping multiple services into a single process conserves computing resources, and this consideration was of particular concern to NT designers because creating Windows processes takes more time and consumes more memory than in other operating systems, e.g. in the Unix family.1 This means briefly that; On Windows operating systems, svchost.exe manages the services and services are actually running under svchost.exe’s as threads. Phant0m targets the Event Log service and finding the process responsible for the Event Log service, it detects and kills the threads responsible for the Event Log service. Thus, while the Event Log service appears to be running in the system (because Phant0m didn't kill process), it does not actually run (because Phant0m killed threads) and the system does not collect logs. [hide][Hidden Content]]
  12. [Hidden Content]
  13. WP Server Log Viewer version 1.0 suffers from a persistent cross site scripting vulnerability. View the full article
  14. FsPro Labs Event Log Explorer version 4.6.1.2115 suffers from an XML external entity injection vulnerability. View the full article
  15. MyBB Moderator Log Notes plugin version 1.1 suffers from a cross site request forgery vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.