Detecting Bruteforcing
Linux
/var/log/, a Linux directory where all security events (logs) are stored. Indeed, every SOC analyst at TBFC will confirm that the best way to find evil bunnies is to check the logs. Log files are usually very big, and looking through them with cat is not ideal. Thus, let's use grep, a command to look for a specific text inside a file.
Navigate to the logs directory with
cd /var/logand explore its content withls.Run
grep "Failed password" auth.logto look for the failed logins inside theauth.log.

Last updated