Log analysis is vital after a hack, and this tool makes it easier. Syhunt enables you to review your log files for potential and confirmed attacks.
Tom Canavan, CMS Security Handbook
(redirected from Products.SyhuntInsight)
Syhunt Forensic
Investigate and prevent security breaches
Syhunt Forensic (formerly Syhunt Insight) quickly analyzes and exposes the source, the type and the methods currently being used to compromise your organization's web applications.
Features
Session Reconstructor
Syhunt Forensic scans the web server logs and reconstructs whole attack sessions accurately differentiating legitimate traffic from malicious ones and further differentiating automated attacks from manual ones.Breach Investigation Tool
Syhunt Forensic instantly determines if a breach has occurred, how it occurred, and the extent of the intrusion allowing you to quickly and effectively respond to a security incident.Automated Attacker Profiler
Syhunt Forensic exposes the attacker skills, tools and methods, by building his complete profile and hacking tool inventory.Keep an eye on all kinds of attacks
Syhunt Forensic uses heuristic analysis of web server logs to detect a wide range of attacks, including:
Check | CWE |
SQL Injection | CWE-89 |
Cross-Site Scripting (XSS) | CWE-79 |
Arbitrary File Reading | CWE-23 |
Buffer Overflow | CWE-120 |
Directory Traversal | CWE-22 |
Format String Attacks | CWE-134 |
Server-Side Code Injection | CWE-96 |
Shell Code Attacks | |
SSI Injection | CWE-97 |
Suspicious Requests | |
IDS Evasion Techniques | |
WAF Rejection | |
Hacking Tools |
In The Media
Web Hacking Exposed
While the benefit of being able to securely configure a web server through your web application security assessment tool is obvious, we were unsure about the log analysis feature until we tired it on one of the authorīs personal web servers hosting several applications live on the Internet
Web Hacking Exposed
Buy Product
Syhunt Forensic runs under any modern 64-bit Linux or Windows version, including Windows 10 and 11 (Specs)