Skip to content

Latest commit

 

History

History
34 lines (27 loc) · 1.84 KB

02 user guide.md

File metadata and controls

34 lines (27 loc) · 1.84 KB

apachelogreader user guide

What is apachelogreader?

apachelogreader is a script written in Python3 for reading apache logs, looks for signs of SQL injections, file inclusion attempts, web-shell attacks and outputs the results in several text files plus one csv file.

Installing apachelogreader

  1. Download main.py, analyze_query.py, and dump_reader.py from the master branch page.
  2. Place the scripts in the same directory as your apache log

Using apachelogreader

  1. Ensure you've unzipped your apache log and it stands as a .log file
  2. run main.py. main.py does 3 things (in following order):
  3. Read the apache log file
  4. Run evaluation tests for SQLi/file inclusion/web-shell attacks
  5. Write suspicious entries into text files and one csv file

As a user you can view the text files for what apachelogreader has found, note down the suspicious ip addresses that are logging some really suspicious activities, then head to the csv file and study the activities of these ip addresses in greater detail.

The csv file allows you to:

  1. Filter by ip addresses
  2. Filter by date/time (by year, month, day, hour, minute, second)
  3. Filter by http port
  4. Filter by http status code
  5. Filter by user agent
  6. Create graphical representations of traffic for visual analysis

All these information, and being able to filter them, ideally allows a web admin to build a profile of suspicious activity and the actors behind them. there's much you can tell by looking into the user-agent that was used by an ip address, the speed at which some requests are sent to the server, the type of requests sent, the persistent presence of an ip address.

The accuracy of the scans is dependent on the code written in analyze_query.py. to tweak the code, please read the developer guide.