Hello Blue teamers and Red Teamers. In this post , we will be analyzing some apache access logs to uncover asset discovery, login brute force and web rce . Then we will uncover how attacker maintained his/her presence in the environment and which IP’s are associated with the threat actor. Analysis …