官术网_书友最值得收藏!

Database logs

We just saw how we could process basic application server logs. Let's see how we can grab database logs and make the most of them in our forensic investigation. Database servers, such as MySQL and MS SQL, contain log files with information that helps a forensic investigator to understand the chain of events in a much better way. General query logs in MySQL present an investigator with all the queries that were executed during the time of the attack:

We can see that the general query log file allows us to view failed attempts by the attacker to log into the MySQL server. However, it also suggests that there are two successful attempts. Let's further investigate:

We can see that after the failed attempts, the attacker logged in and ran the preceding queries on the database. Query log files are convenient for pinpointing the actual intent of the attacker. In the upcoming chapters, we will look at numerous case study examples on various databases.

On XAMPP, general query logs can be enabled by running the following query:

SET global general_log = 1;

Here's a better way to log all queries in MySQL:

SET global general_log_file='/tmp/mysql.log'; 
SET global log_output = 'file';
SET global general_log = on;  
主站蜘蛛池模板: 九龙城区| 卓尼县| 商丘市| 岑巩县| 平度市| 卢湾区| 崇文区| 长治县| 陆良县| 池州市| 鄂托克前旗| 兰西县| 安塞县| 绥芬河市| 揭西县| 绥中县| 佳木斯市| 天全县| 凤台县| 噶尔县| 兰溪市| 景东| 鱼台县| 阿勒泰市| 扬州市| 马鞍山市| 芜湖市| 齐齐哈尔市| 十堰市| 勐海县| 交城县| 凤城市| 灵山县| 衢州市| 台南市| 高要市| 河源市| 盱眙县| 班戈县| 寻甸| 黄冈市|