John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.
Definitely going with C on this one. The regex pattern is a dead giveaway for a directory traversal attempt. Better lock down those web server logs, John!
I'm not sure, but I think this could also be a parameter tampering attack. The regex pattern seems to be looking for malicious input in the URL parameters.
This looks like a classic directory traversal attack to me. The regex pattern searches for suspicious directory traversal patterns, so C is the correct answer.
Edward
2 days agoDannette
4 days agoCristal
6 days agoAzalee
12 days agoMillie
12 days agoKarrie
13 days agoFreeman
25 days ago