If you are looking for software to use, go to Huajun Software Park! software release AI product list

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card and a photo of yourself holding the ID card), and send it to email http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: Home pagePC softwaresecurity softwareAnti-black and anti-horse Web log security analysis tool
Web log security analysis tool

Web Log Security Analysis Tool V2.0 Green Free Edition

QR code
  • Software licensing: free software
  • Software size: 4.8MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-12-30
  • Application platform: winall
  • Software language: Simplified Chinese
  • Edition: V2.0 green free version

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Web log security analysis tool section first LOGO
The Web log security analysis tool can perform security analysis on Web logs, quickly discover suspicious malicious attack behaviors from Web logs, automatically identify the physical location of the attacker's IP, and finally generate a readable security analysis report to facilitate security personnel to analyze the attacker's intrusion process.

Security analysis report:
Screenshot of Web log security analysis tool

Features of Web Log Security Analysis Tools

1. Supports detection of multiple popular attack types and automatically identifies the physical location of the attacker's IP
2. Support custom attack signature library, such as adding attack types and attack signatures
3. Generate humanized analysis reports to facilitate analysis of the attacker’s intrusion process. Supported log types:
IIS W3C, Apache/Tomcat/Nginx default log format
Supported detection attack types:
By default, it can detect multiple attack types such as SQL injection/XSS attack/IIS write permission vulnerability exploitation/Struts remote command execution vulnerability. The actual situation depends on the characteristics in the attack signature database.
Feature library description:
The default signature library (AttackRules.ini) defines some common attack signatures and uses regular expression matching; during actual use, users can modify or add attack signatures according to their actual needs.
Environmental description:
This software uses C# language and is developed using VS 2008. Normal operation requires .net framework 3.5 and above.

How to use

Open the program, select the web log file to be analyzed and the corresponding log type, and click the "Analyze" button. After the analysis is completed, a security analysis report is automatically generated.

Related document description:

Web log security analysis tool v2.0.exe: main program
AttackRules.ini: Attack signature library, which defines some common attack signatures. Attack types and attack signatures can be customized in this file.
NewTemplet.tpl: Analysis report generation template.
qqwry.dat: Pure IP database, its function is to automatically identify the physical location of the attacker's IP when an attack log is detected.

FAQ

Web log security analysis tool

Web Log Security Analysis Tool V2.0 Green Free Edition

close