Find software for software and go to Huajun Software Park! Software release

Hello, if there is a software for software, please pack the software, and attach software names, software introduction, software -related screenshots, software icon, soft, and business license (Personally do not have a business license, please provide the corresponding developer ID card on the front and back sides of the ID card. And the photo of the ID card yourself), send it to the mailbox http://softWaredownload4.com/sbdm/user/login

Prading it >>

Send to the mailbox:news@onlinedown.net

Prading it >>

Location: front page————PC software————Security software————Anti -Black ———— Web log security analysis tool
Web log security analysis tool

Web log safety analysis tool v2.0 green free version

QR code
  • Software authorization: Free software
  • Software size: 4.8MB
  • Software score:
  • Software type: Domestic software
  • Update time: 2017-09-19
  • Application platform: winall
  • Software language: Simplified Chinese
  • Version: V2.0 Green Free Edition

Download the service agreement to see the bottom of the page

Software introduction Related topics Common problem Download address

Basic profile
WEB log Safety Analysis Tool Section Logo
Web log security analysis tools can conduct security analysis of the web log, quickly find suspicious malicious attacks from the web log, and automatically identify the physical location where the attacker IP is located. Analyze the invasion of the attacker.

Safety analysis report:
Screenshot of Web log security analysis tool

The characteristics of the web log security analysis tool

1. Support to detect a variety of popular attack types, and automatically identify the physical location where the attacker IP is located
2. Support custom attack feature library, such as adding attack types and attack features
3. Generate humanized analysis reports to facilitate analyzing the invasion process of the attacker to support the log type:
IIS W3C, Apache/Tomcat/Nginx default log format
Support detection attack type:
The default can detect SQL injection/XSS attack/IIS writing permissions vulnerabilities. Various attack types such as vulnerabilities in the/struts remote command depends on the characteristics of the attack feature library.
Feature library description:
The default feature library (Attackrules.ini) defines a part of the common attack features and adopts regular expression matching; in the actual use process, users can modify or add attack features according to their actual needs.
Environment description:
This software uses the C#language and is developed with VS 2008. Normal operation needs .NET Framework 3.5 and above.

Use

Open the program, select the web log file and the corresponding log type to be analyzed, and click the "Analysis" button. After the analysis is completed, a safety analysis report will be automatically generated.

Related file description:

Web log security analysis tool v2.0.exe: main program
Attackrules.ini: Attack feature library, which defines part of the common attack features, can customize the type and attack characteristics in this file.
Newtemplet.tpl: Analysis report generate template.
QQwry.dat: Innocent IP database, the role is to automatically identify the physical location where the attacker IP is located when the attack log is detected.

Common problem

Web log security analysis tool

Web log safety analysis tool v2.0 green free version

closure