How to efficiently analyse logs from elastic search to look for vulnerabilities? [closed]

I am a working student as an information security analyst .
my company provides a bunch of software in our daily work like for example gitlab and jira . Every interaction between the user and the software is logged inside elastic stack .
L… Continue reading How to efficiently analyse logs from elastic search to look for vulnerabilities? [closed]

How delete windows logs with powershell & cmd command in period of time [closed]

I am curious that how can can i delete windows logs with PowerShell & cmd command in period of time?
Period of time mean only delete specific logs related to last two month.
Please show all possible ways in both PowerShell & cmd.

Continue reading How delete windows logs with powershell & cmd command in period of time [closed]

How to find data associated with windows defender processStart reference in windows10

Recently my windows defender warned me about a possibly malicious program it found on my pc. I have trouble interpreting the data windows defender serves me and I haven’t found any microsoft documentation regarding the processStart value.
Continue reading How to find data associated with windows defender processStart reference in windows10

Defining user anomalies by analysing web server interaction counts [closed]

I’m researching log-analysis using webserver/HTTP logs, so I created the pipeline for this use case (Anomaly detection). Let’s say I have number/counts of logged records/events for each username.

The problem is I’m not sure what is the be… Continue reading Defining user anomalies by analysing web server interaction counts [closed]

LogExtractor: Extracting Digital Evidence From Android Log Messages Via String & Taint Analysis

Hi, thanks for showing me. This is Christian Chao, a PhD from Iowa State University. Today, I’m going to present LogExtractor. This is joint work with Chen Shi and my advisor is professor Neil Zhenqiang Gong and professor Yong Guan. &hellip… Continue reading LogExtractor: Extracting Digital Evidence From Android Log Messages Via String & Taint Analysis