o (心) o sadness

WeChat cannot be downloadedWeb log security analysis tool, But just click on the upper right corner to select it in the browser or Safari!
Web log security analysis tool

Web log security analysis tool

  • Size: 4.8M
  • Language: Simplified Chinese
  • category: Anti -Black
  • System: WINALL

Web log security analysis tools can conduct security analysis of the web log, quickly find suspicious malicious attacks from the web log, and automatically identify the physical location where the attacker IP is located. Analyze the invasion of the attacker.

Safety analysis report:
Web log security analysis tool

The characteristics of the web log security analysis tool

1. Support to detect a variety of popular attack types, and automatically identify the physical location where the attacker IP is located
2. Support custom attack feature library, such as adding attack types and attack features
3. Generate humanized analysis reports to facilitate analyzing the invasion process of the attacker to support the log type:
IIS W3C, Apache/Tomcat/Nginx default log format
Support detection attack type:
The default can detect SQL injection/XSS attack/IIS writing permissions vulnerabilities. Various attack types such as vulnerabilities in the/struts remote command depends on the characteristics of the attack feature library.
Feature library description:
The default feature library (Attackrules.ini) defines a part of the common attack features and adopts regular expression matching; in the actual use process, users can modify or add attack features according to their actual needs.
Environment description:
This software uses the C#language and is developed with VS 2008. Normal operation needs .NET Framework 3.5 and above.

Use

Open the program, select the web log file and the corresponding log type to be analyzed, and click the "Analysis" button. After the analysis is completed, a safety analysis report will be automatically generated.

Related file description:

Web log security analysis tool v2.0.exe: main program
Attackrules.ini: Attack feature library, which defines part of the common attack features, can customize the type and attack characteristics in this file.
Newtemplet.tpl: Analysis report generate template.
QQwry.dat: Innocent IP database, the role is to automatically identify the physical location where the attacker IP is located when the attack log is detected.

Version: V2.0 Green Free Edition | Update time: 2017-09-19

Similar recommendation

Latest update

Web log security analysis tool comment

  • 1st floor Huajun netizen 2021-01-17 21:30:46
    Web log safety analysis tools are very useful, thank you! Intersection
  • 2nd floor Huajun netizen 2018-04-13 00:45:12
    The design of the web log security analysis tool interface is easy to get started, and the function is very rich. I strongly recommend it!
  • 3rd floor Huajun netizen 2020-11-28 14:00:23
    Web log security analysis tool software is very easy to use, download speed is fast, very convenient!

Boutique recommendation

EveryoneStill likeThese:

+

The application has not passed the real -name authentication, you can download it through your mobile assistant.

CancelOK