Log analysis is vital after a hack, and this tool makes it easier. Syhunt enables you to review your log files for potential and confirmed attacks.
Tom Canavan, CMS Security Handbook
Syhunt Forensic (formerly Syhunt Insight) quickly analyzes and exposes the source, the type and the methods currently being used to compromise your organization's web applications.
Syhunt Forensic uses heuristic analysis of web server logs to detect a wide range of attacks, including:
Check | CWE |
SQL Injection | CWE-89 |
Cross-Site Scripting (XSS) | CWE-79 |
Arbitrary File Reading | CWE-23 |
Buffer Overflow | CWE-120 |
Directory Traversal | CWE-22 |
Format String Attacks | CWE-134 |
Server-Side Code Injection | CWE-96 |
Shell Code Attacks | |
SSI Injection | CWE-97 |
Suspicious Requests | |
IDS Evasion Techniques | |
WAF Rejection | |
Hacking Tools |
Log analysis is vital after a hack, and this tool makes it easier. Syhunt enables you to review your log files for potential and confirmed attacks.
Tom Canavan, CMS Security Handbook
While the benefit of being able to securely configure a web server through your web application security assessment tool is obvious, we were unsure about the log analysis feature until we tired it on one of the authorīs personal web servers hosting several applications live on the Internet
Web Hacking Exposed
Syhunt Forensic runs under any modern 64-bit Linux or Windows version, including Windows 10 and 11 (Specs)