Created by Paul
With so many companies offering services over the web, HTTP access logs have become an important forensic resource. Most web servers log basic information about each HTTP request. These logs tend to follow a loose, non-standardized format, so parsing them reliably can be tricky. The log in this challenge was generated by Nginx, a popular web server.
Use this file to answer the challenge questions!
- How many requests were logged?
- How many unique status codes were returned by the server?
- How large was the largest response body in bytes?
- How many HTTP tunneling attempts were made?
- How many entries have completely invalid request lines containing raw binary data?
- Of those invalid entries, how many likely the result of an attempt to establish an SSL or TLS connection?
- How many unique user agents were observed, excluding empty or missing user agents?
- How many requests were made by Firefox?
- How many attempts were made to exploit CVE-2020-8515?
Submit your answers here.
Need help answering this challenge? Check out Paul’s writeup here and Taisa’s guide to Command-line Log Analysis (part 3 is specifically about this challenge).
You must be logged in to post a comment.