From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Review firewall logs
From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Review firewall logs
- [Instructor] The Windows Firewall maintains a log of all allowed and blocked connections but this can become quite a large text file which is somewhat difficult to use. The ZedLan analyzer for Windows Firewall logs provides a more manageable interface for log viewing and analysis. It's available as a free download from the MoonPoint site shown here. I've already installed this on my computer so I'll get straight into it. I'm running it as Administrator as I need to access system space to get the logs. ZedLan needs to be configured before we can use it. Let's do that now by clicking the link in the middle of the screen. We need to specify where our log files are and ZedLan pops up a window to ask us to enter the location or to let ZedLan automatically detect it. I'll close this alert and look for the log files manually. I'll press the Browse button and navigate to Windows system 32 log files firewall and I'll select the pfirewall file. If the Lookup Hostnames checkbox is set, ZedLan…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
- (Locked) Understanding Firewalls1m 2s
- (Locked) Apply the basics of the Windows firewall5m 17s
- (Locked) Use advanced features in the Windows Firewall8m 18s
- (Locked) Review firewall logs3m 22s
- (Locked) Understand Linux IPTables4m 14s
- (Locked) Set up an IPTables firewall2m 52s
- (Locked) Manage rules with Firewall Builder8m 24s
- (Locked) Port testing1m 7s
- (Locked)
-
-
-
-
-
-