Log Forensics Basics
📖 Scenario: You are a cybersecurity analyst investigating a suspicious activity on a company server. You have access to a log file that records user actions with timestamps and IP addresses.Your task is to analyze the log entries to identify any unusual login attempts based on a threshold of failed attempts.
🎯 Goal: Build a simple log analysis setup that stores log entries, sets a threshold for failed login attempts, counts failed attempts per IP, and identifies IPs exceeding the threshold.
📋 What You'll Learn
Create a dictionary called
log_entries with exact entries for user login attemptsAdd a variable called
failed_attempt_threshold set to 3Use a
for loop with variables ip and status to iterate over log_entries.items() and count failed attempts per IPCreate a list called
blocked_ips that contains IPs with failed attempts greater than the threshold💡 Why This Matters
🌍 Real World
Cybersecurity analysts use log forensics to detect unauthorized access attempts and protect systems from attacks.
💼 Career
Understanding how to analyze logs and identify suspicious patterns is essential for roles like security analyst, incident responder, and network administrator.
Progress0 / 4 steps