Posts

Showing posts from March, 2016

Log Analysis: Analysis on Auth.log

Image
This entry may assist Incident Handlers to analyse the brute-force attacks that may  leverage on SSH protocol.  Overview of auth.log —————————- fikri~$ cat auth.log | head Mar 16 08:12:04 app-1 login[4659]: pam_unix(login:session): session opened for user user3 by LOGIN(uid=0) Mar 16 08:12:09 app-1 sudo:     user3 : TTY=tty1 ; PWD=/home/user3 ; USER=root ; COMMAND=/bin/su Mar 16 08:12:09 app-1 sudo: pam_unix(sudo:session): session opened for user root by user3(uid=0) Mar 16 08:12:09 app-1 sudo: pam_unix(sudo:session): session closed for user root Mar 16 08:12:09 app-1 su[4679]: Successful su for root by root Mar 16 08:12:09 app-1 su[4679]: + tty1 root:root Mar 16 08:12:09 app-1 su[4679]: pam_unix(su:session): session opened for user root by user3(uid=0) Mar 16 08:12:13 app-1 groupadd[4691]: new group: name=user4, GID=1001 Mar 16 08:12:13 app-1 useradd[4692]: new user: name=user4, UID=1001, GID=1001, home=/home/user4, shell=/bin/bash Mar 16 08:12:17 a