Skip to content

CryptoKait

Home of the National Cyber League Player Ambassadors

  • CryptoKait
    • Home
    • About CryptoKait
    • Workshops and Public Appearances
    • Blog Posts by CryptoKait
    • Contact CryptoKait
  • Blog
  • Initiatives
    • Meet the NCL Player Ambassadors & Apply
    • CryptoKait’s Feature Friday
    • Apply to Be Featured on the CryptoKait.com Blog
    • Player Ambassador Diversity & Inclusion Advisory Board
  • National Cyber League
    • START HERE: NCL Coaching Guide for Everyone
    • Meet the NCL Player Ambassadors
    • NCL Blog
    • NCL Practice
    • Webinars and Live Shows
  • Personal Development
    • Adulting
    • Career Advice & Human Skills
    • Self Care
  • Cybersec Clubs
    • Cybersecurity Club Survival Guide
    • Blog Category: Cybersecurity Clubs
    • Collaboration Tips
  • Cybersec Bootcamps
    • Beginner Python with wolfshirtz
    • Command-line Log Analysis with Taisa

Tag: Blog Series: Command-line Log Analysis FOR THE WIN

Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log

February 17, 2021February 28, 2021Leave a comment

By Taisa
(Third in a three-part series.)
Reinforce what you've learned with examples and repetition! Taisa guides you through how you can untangle the Web Access Log challenge on your own using the command-line tools from Parts 1 and 2 in this series. You've got this!

Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”

February 15, 2021February 28, 2021Leave a comment

By Taisa
(Second in a three-part series.)
In this article, Taisa walks us through how to solve the Leaping Log Analysis challenge using only command-line tools (plus a little OSINT). Utilities demonstrated in this guide: cat, grep, cut, sort, uniq, tr, paste, bc, wc, head, and a little regex.

Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log

February 10, 2021February 28, 20211 Comment

By Taisa
(First in a three-part series.)
In 2017, Taisa was traumatized by logs. In 2018, she was analyzing logs by hand on a browser-only Chromebook. In 2020, she was #1 on the leaderboard in Log Analysis at the end of the Spring Preseason. Follow her Command-line Log Analysis blog series to find out which tools she used and how she did it—and how you can, too!

Follow Your Favorite NCL PA

  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,662 other followers

Your Favorite Authors

  • 0x600DF00D
    • How to Use Your Coach’s Link
    • Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
  • Aaron James
    • Reverse Engineering: Fake It Until You Make It!
    • Taking Password Cracking to the Next Level
    • NCL and WSL: Leaving the Kali VM Behind
    • Fresh Kali…I mean Coffee
  • John McGill
    • CompTIA Security+ – One Certification to Rule Them All
    • Organizing Your Workspace
    • Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
    • Hiding in Plain Sight: Steganography Tricks and Tips
  • CryptoKait
    • How Do I Register and Pay for Students?
    • Everything You Need to Know About the NCL Team Game
    • CryptoKait Blog Reaches 100k Views
    • An Open Letter About the NCL/CompTIA Partnership from the NCL Player Ambassadors
  • ZeroTrail
    • Transferring Your Non-Tech Skills to a Cyber Security Job
    • How Setting Up a Virtual Machine and Navigating Through It Can Help You with NCL
    • How Playing War Games Can Help You Learn Command Line
    • Everything You Need to Know About Preseason
  • drzeichick
    • Navigating the Coach Dashboard
    • Everything You Need to Know About the NCL Gym – Zombie Survival Guide Version
    • What Should I Consider When Selecting a Program for Cybersecurity?
  • PressSpace2Hack
    • How to Keep Your Accuracy and Score All the Points
    • Everything You Need to Know About the NCL From Someone Who Has Been Around as Long as Kait
    • What’s New in Cyber Skyline for Fall 2020
    • Writing Elegant Regular Expressions
  • Taisa
    • Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log
    • Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”
    • Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
    • Low-tech Tooling: Competing From a Device You Can’t Install Tools On
  • Fred Stinchcombe
    • Need Some Buy In – Tips on Selling NCL to Your School Admins
    • Everything You Need to Know About the NCL Gym (but Were Too Afraid to Ask Someone)
    • What I Learned from Teaching Cyber at an All Girls High School
    • Summer Camp 2020 – Metadata
  • ghostinth3machine
    • How to Regex When You Know Nothing
    • How to Go From Hashed to Cracked With Hashcat
    • How to Command Line When You Know Nothing
    • Everything You Need to Know About the NCL Season
  • Jacob Corley
    • A Day in the Life of a Cyber Engineer
    • How Creating CTFs Challenges Helps You Succeed in CTFs
    • How to Include the National Cyber League Games on Your Résumé
    • Finding a Team When You’re Playing Solo
  • Hush1e
    • Volunteer Work and How Not to Take on Too Much
    • Who Should Play the NCL CTF and Why?
    • What Are the NCL Power Rankings?
    • Effective Team Work That Includes All Player Levels
  • Jeana Byte
    • Google-Fu: A Tour of Google Dorking
    • Everything You Need to Know on How to Run Your Preseason Recaps
    • Everything I Learned About Cryptography from Working and Living with CryptoKait
    • What’s the Deal with the National Cyber League?
  • mistressven0m
    • Everything You Need to Know About Our CompTIA Partnership
    • How to Use NCL to Influence and Improve Your Résumé and Professional Appearance
    • Four Ways to Analyze Logs Like a Pro!
    • Online Password Cracking
  • WebWitch
    • What is HTTP Request Smuggling and Why Do I Care?
    • What Do the NCL Brackets Mean?
    • Top Ten Reasons Why You *Shouldn’t* Play in the NCL Games
    • Why NCL is Great Even If You Aren’t in Cyber
  • wolfshirtz
    • Why Steganography is Cryptography
    • Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
    • Collaborative Python Scripting for the Team Games
    • Containerizing Your CTF Stack: Using Docker for CTFs and NCL
Website Powered by WordPress.com.
Cancel

You must be logged in to post a comment.

Loading Comments...
Comment
    ×