Question: ELK Stack Revisit the access - 2 logfile . What can you correlate between the logfile and your Wireshark output? Are there any similarities? Try
ELK Stack
Revisit the access logfile What can you correlate between the logfile and your Wireshark output? Are there any similarities?
Try to piece the story together based on the information you see from the provided artifacts.
Where does it look like the attack originated from?
What did the attacker attempt to do
Compile your findings and incorporate them into your deliverables for this project.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
