From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Detecting exploitation with the ELK Stack

Detecting exploitation with the ELK Stack

From the course: Complete Guide to Open Source Security

Detecting exploitation with the ELK Stack

- [Instructor] We're at the monitoring screen in ELK stack, and have a 15-minute realtime window showing our earlier reconnaissance stage of the attack. Let's now start stage two. As we watch the display, we start to see a lot of messages for app01. If we open one, we can see this as an SSH logging event, and we can see it's got a failure outcome. On the second page, we can see the related user is Akhtar, so let's add related user to our display, and event outcome. We'll also now, and set our source IP to our attacker's source to find out what our attacker is doing. So we can now see we have a continuous stream of events with a failure outcome. This is, in fact, our Hydra attacks against app01. We've now seen a success in the attack, and we're now seeing some activity against our gym website. With an upload of a PHP file, we can see the PHP file, kamehameha.PHP, has been put into the upload. We'll stop our real-time activity, and we'll change our filter to be source IP 192.168.1.100…

Contents