Monday 21 March 2016

Real-Time Web Log Analyzer

GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems. It provides fast and valuable HTTP statistics for system administrators that require a visual server report on the fly.  


GoAccess Main Dashboard

Features

GoAccess parses the specified web log file and outputs the data to the X terminal. Features include:
  • General statistics, bandwidth, etc.
  • Time taken to serve the request (useful to track pages that are slowing down your site)
  • Metrics for cumulative, average and slowest running requests
  • Top visitors
  • Requested files & static files
  • 404 or Not Found
  • Hosts, Reverse DNS, IP Location
  • Operating Systems
  • Browsers and Spiders
  • Referring Sites & URLs
  • Keyphrases
  • Geo Location - Continent/Country/City
  • Visitors Time Distribution
  • HTTP Status Codes
  • Metrics per Virtual Host
  • Ability to output HTMLJSON and CSV
  • Tailor GoAccess to suit your own color taste/schemes
  • Incremental log processing
  • Support for large datasets and data persistence
  • Support for HTTP/2 & IPv6
  • Output statistics to HTML. See .

Nearly all web log formats...

GoAccess allows any custom log format string. Predefined options include, but not limited to:
  • Amazon CloudFront (Download Distribution).
  • AWS Elastic Load Balancing
  • Combined Log Format (XLF/ELF) Apache | Nginx
  • Common Log Format (CLF) Apache
  • Google Cloud Storage.
  • Apache virtual hosts
  • Squid Native Format.
  • W3C format (IIS). 
Download tool : https://goo.gl/kmE8R9

What, When, Where, How Ethical Hacking?

What is Ethical Hacking?
             It is a way to hack computer and network with organization permission .By the help of Ethical Hacking you can find the point which has to give permission to enter unauthorized person (intruder). Ethical hacking is a proactive form of information security and is also known as penetration testing, intrusion testing and red teaming. Those who doing Ethical hacking is known as Ethical Hacker.  An Ethical Hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
                An ethical hacker is the complete opposite of a malicious hacker. An ethical hacker is an information security professional. This is a good guy. They use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security.
 For hacking to be deemed ethical, the hacker must obey the following rules:
  •    Expressed permission to probe the network and attempt to identify potential security risks.
  •    Ethical Hacker should respect the individual's or company's privacy.
  •    Ethical Hacker should close out your work, not leaving anything open for you or someone     else to exploit at a later time.
  •   Ethical Hacker should let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.
Purpose of Ethical Hacking: -
  • Evaluate the security of a network or system's infrastructure
  • Finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible
Whom they need Ethical Hacking: -
  •  Any organization that has a network connected to the Internet or provides an online service should consider subjecting it to a penetration test.
  • Banker 
  •  Government agencies
  •   Business Organization
Goal of the Ethical Hacking: -
  •   Fighting against terrorism and national security breaches?
  • How much effort, time and money are an organization is willing to expend to obtain adequate protections?
  • Having adequate preventative measures in place to prevent security breaches?
  • What can intruder do with the information capture?
  • Having a computer system that prevents malicious hackers from gaining access
  • What is organization to protect?
  • Are your developers are concerned about security?
  • Is your customer and clients data's are exposed to public or not?
  • Do you have better brand reputation?
What are the benefits to organization if they have Ethical Hacker: -
  •  Organizations under constant Cyber-Attack
  •  To build a computer system that prevents hackers’ access and safeguard system and information from malicious attack
  •  To manage adequate preventive measures in order to avoid security breaches
  •   To safeguard user or customer information available in business transactions and visits
  •   To test networks at regular intervals
  •   To create security awareness at all levels in a business
How to become a professional and Qualified Ethical Hacker?
  •  Know about the different types of hackers, such as White Hat, Grey Hat and Black Hat hackers.
  • Seek out job opportunities for ethical hackers.
  • Analyse the basic requirements to become an ethical hacker.
  •  Decide the area where you would prefer to work primarily with hardware or software.
  • Evaluate your strengths and interests and gain some programming knowledge such as C, Python or Java.
  • Learn the UNIX operating system as it is regarded as the original operating system built by hackers.
  • Take a professional course.
  • Do the experiments on your own to know the actual happening of a situation.
  •  Start experimenting with hardware and software to learn how to take control of the situations and how to prevent a computer from getting hacked.
  • Read on your own to know what are the areas where you need to improve and what need to be learned to refine your focus. 
  • Stay connected to the hacker community by sharing technical information and ideas.
 Disadvantages of Ethical Hacking: -
  • The ethical hacker using the knowledge they gain to do malicious hacking activities
  • Allowing the company’s financial and banking details to be seen
  • The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system
  • Massive security breach
Should we trust Ethical Hacking Certificate courses?
  • Hacking is the skill which cannot learnt with in a certification. But can understand what is hacking.
  •  Self learning is a right option to become good ethical hacker
  •  International certifications are concerned to create brand instead of certification
  •  Learn hacking via Open source tool is advisable
  • Ethical hacking boundary should depends on your cyber countries security law.
Conclusions: -
                Hacking may be defined as legal or illegal, ethical or unethical. The media’s portrayal of hacking has boosted one version of discourse. Ethical Hacking offer unparalleled insight into an organization’s security effectiveness as well as a road map for enhancing security.  By hiring Ethical Hacker to simulate a cyber-attack, vulnerabilities can be identified and corrected before they are exploited by a hacker or malicious insider.  It is suggested that this section echo portions of the overall test as well as support the growth of the client security posture.