header bg

Scan QR code or get instant email to install app

Question:

Minerva is looking to verify if her web application on a Linux system has been subjected to a SQL injection attack. Which log file should she check to find evidence of such an attack?

A The web server log.
explanation

HTTP or HTTPS requests are used to send SQL injection attempts to a web server, so Minerva can identify these attacks by reviewing the web server log. DNS logs are not helpful in detecting such attacks. Authentication logs only capture login attempts and not SQL Server queries or web requests. Unlike Windows, Linux does not have a security log file, but some systems may have a secure log.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*