John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.
Definitely going with C on this one. The regex pattern is a dead giveaway for a directory traversal attempt. Better lock down those web server logs, John!
I'm not sure, but I think this could also be a parameter tampering attack. The regex pattern seems to be looking for malicious input in the URL parameters.
This looks like a classic directory traversal attack to me. The regex pattern searches for suspicious directory traversal patterns, so C is the correct answer.
Edward
3 months agoMicaela
30 days agoChristiane
1 months agoWillard
1 months agoCatina
2 months agoDannette
3 months agoCristal
3 months agoAzalee
3 months agoShawna
2 months agoGeorgeanna
3 months agoMillie
3 months agoKarrie
3 months agoFreeman
4 months ago