Publicly available? Check. A pretty interface that basically says “Welcome, please break me”? Check. Honestly, what could be a better target than a web application? It’s like leaving your front door wide open, putting a “Free Pizza” sign on it, and being surprised when a thousand hackers show up for a slice!
We will spend 90% of our time looking at these two things:
IP - - [Date] "METHOD /path HTTP/1.1" STATUS SIZE "Referrer" "User-Agent"| Attack Type | What to look for as a SOC |
|---|---|
| SQL Injection (SQLi) | Keywords: SELECT, UNION, OR 1=1, --, SLEEP(). |
| Cross-Site Scripting (XSS) | Tags: <script>, alert(), onerror=. |
| Path Traversal | Patterns: ../../, /etc/passwd, , /admin, C:\Windows\. |
| Remote File Inclusion | Links: http://malicious-site.com/shell.txt. |
| Web Shell | Abnormal POST and GET see Bo Cyber Logbook - Web Shell |
| DDos | spike of traffic Bo Cyber LogBook - Web DDoS |
| Additionally | uncommon user-agent (although this can be fabricated) |
Last Modified: 2025-12-28 \