John "Mako" McGill
Parsing log files is an art form, not unlike sculpting—"cut away all the parts of the wood block that are not the bear." In place of an axe and knife, Mako shows us how to whittle the bear from the log using grep, regex, awk, sed, uniq, sort, and pipe!
Category: NCL-Log Analysis
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Leaping into Log Analysis
WebWitch
Log analysis becomes very important when you're trying to identify the source of a breach. WebWitch consults their command-line spellbook to summon forth the fundamental tools of log analysis, and shares their pro tips for preserving accuracy.
Log Analysis Tips for People Who Aren’t Ready for Command Line
CryptoKait
"If you want to learn how to do log analysis properly, this probably isn't the post for you." –CryptoKait
"There are plenty of ways to get things done. . . . I have always been good at Excel, and I firmly believe you should use things you are familiar with." –Also CryptoKait(*)
My National Cyber League (NCL) Prep-Guide
CryptoKait's first prep guide for the NCL in 2017 remains a relevant read! A brief introduction to the Games is followed by beginner-friendly toolkit suggestions structured by domain. Plus, it's fun to go back and see what has and hasn't changed!
You must be logged in to post a comment.