Day #6 — Log Analysis Basics: Linux Auth Log (SSH Brute-Force Simulation)
Lab Setup
sudo apt update
sudo apt install openssh-server rsyslog -y # Ubuntu/Debian
sudo systemctl enable --now sshLab Simulation — Step-by-Step
A. Prepare the victim (Ubuntu)
B. Attacker: Run a controlled brute-force with hydra
C. Observe & collect evidence (defender)
Log Analysis — Commands & Heuristics
Count failed attempts per IP (how noisy)
Count unique usernames attempted per IP (target diversity)
Rate-based alert: alert if >20 failures in last 200 lines
User-focused view (who's being targeted)
What to capture as evidence (deliverables)
Detection Heuristics (simple & practical)
Immediate Mitigations (commands)
Last updated