Web Security Monitoring

Publicly available? Check. A pretty interface that basically says “Welcome, please break me”? Check. Honestly, what could be a better target than a web application? It’s like leaving your front door wide open, putting a “Free Pizza” sign on it, and being surprised when a thousand hackers show up for a slice!

We will spend 90% of our time looking at these two things:

Indicators

Attack Type What to look for as a SOC
SQL Injection (SQLi) Keywords: SELECT, UNION, OR 1=1, --, SLEEP().
Cross-Site Scripting (XSS) Tags: <script>, alert(), onerror=.
Path Traversal Patterns: ../../, /etc/passwd, , /admin, C:\Windows\.
Remote File Inclusion Links: http://malicious-site.com/shell.txt.
Web Shell Abnormal POST and GET see Bo Cyber Logbook - Web Shell
DDos spike of traffic Bo Cyber LogBook - Web DDoS
Additionally uncommon user-agent (although this can be fabricated)

Extended Readings:


Last Modified: 2025-12-28 \