- Hands-On Network Forensics
- Nipun Jaswal
- 207字
- 2021-06-24 16:04:22
Database logs
We just saw how we could process basic application server logs. Let's see how we can grab database logs and make the most of them in our forensic investigation. Database servers, such as MySQL and MS SQL, contain log files with information that helps a forensic investigator to understand the chain of events in a much better way. General query logs in MySQL present an investigator with all the queries that were executed during the time of the attack:

We can see that the general query log file allows us to view failed attempts by the attacker to log into the MySQL server. However, it also suggests that there are two successful attempts. Let's further investigate:

We can see that after the failed attempts, the attacker logged in and ran the preceding queries on the database. Query log files are convenient for pinpointing the actual intent of the attacker. In the upcoming chapters, we will look at numerous case study examples on various databases.
On XAMPP, general query logs can be enabled by running the following query:
SET global general_log = 1;
Here's a better way to log all queries in MySQL:
SET global general_log_file='/tmp/mysql.log'; SET global log_output = 'file'; SET global general_log = on;
- Extending Symfony2 Web Application Framework
- Kali Linux Social Engineering
- 計(jì)算機(jī)使用安全與防護(hù)
- Web安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 網(wǎng)絡(luò)空間安全實(shí)驗(yàn)
- 隱私計(jì)算
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- Hands-On Artificial Intelligence for Cybersecurity
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究
- Securing Network Infrastructure
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)
- 網(wǎng)絡(luò)安全滲透測試
- Linux安全實(shí)戰(zhàn)