Understanding Attack Types

Learn to identify and interpret different types of security threats in your logs.

Common Attack Patterns

SQL Injection Attacks

What you'll see in logs:

URI: /login.php?id=1' OR '1'='1
Rule ID: 942100
Group: coreruleset

What it means: Attackers try to manipulate your database by injecting SQL code into form fields or URLs. This can lead to data theft, unauthorized access, or database corruption.

Why it's dangerous:

  • Can expose sensitive customer data
  • May allow unauthorized admin access
  • Could corrupt or delete your database

Cross-Site Scripting (XSS)

What you'll see in logs:

URI: /search?q=<script>alert('xss')</script>
Rule ID: 941100
Group: coreruleset

What it means: Attackers try to inject malicious JavaScript code to steal user data, hijack sessions, or redirect visitors to malicious sites.

Why it's dangerous:

  • Can steal user login credentials
  • May hijack user sessions
  • Could redirect users to malicious websites

File Inclusion Attacks

What you'll see in logs:

URI: /page.php?file=../../../etc/passwd
Rule ID: 930100
Group: coreruleset

What it means: Attackers try to access sensitive files on your server by manipulating file paths in URLs.

Why it's dangerous:

  • Can expose server configuration files
  • May reveal sensitive system information
  • Could lead to complete server compromise

Brute Force Attacks

What you'll see in logs:

URI: /wp-admin/admin-ajax.php
Rule ID: 912001
Group: wordpress
Multiple entries from same IP within minutes

What it means: Automated tools try thousands of username/password combinations to break into your admin area.

Why it's dangerous:

  • Can lead to unauthorized admin access
  • May lock out legitimate users
  • Often precedes more serious attacks

Bot and Scanner Traffic

What you'll see in logs:

URI: /admin/config.php
Rule ID: 913100
Group: coreruleset
User-Agent: sqlmap/1.0

What it means: Automated tools scan your website looking for vulnerabilities, outdated software, or security weaknesses.

Why it's concerning:

  • Identifies vulnerabilities for future attacks
  • Consumes server resources
  • Often followed by targeted attacks

Attack Severity Levels

High Severity

  • SQL Injection attempts
  • Remote code execution
  • File upload attacks
  • Authentication bypass

Medium Severity

  • Cross-site scripting (XSS)
  • Local file inclusion
  • Brute force attempts
  • Scanner activity

Low Severity

  • Suspicious user agents
  • Malformed requests
  • Protocol violations
  • Rate limit violations

Geographic Attack Patterns

High-Risk Regions

Common sources of automated attacks:

  • Countries with lax cybersecurity enforcement
  • Regions with high concentrations of compromised computers
  • Areas known for hosting malicious infrastructure

Attack Timing

  • Business Hours: Often targeted attacks during your local business hours
  • Off Hours: Automated attacks typically run 24/7
  • Weekends: Many attacks increase when IT staff is unavailable

Response Priorities

Immediate Action Required

  • Multiple high-severity attacks from the same source
  • Successful bypass attempts (check access logs)
  • Attacks targeting known vulnerabilities in your software

Monitor Closely

  • Persistent scanning from specific IPs
  • New attack patterns not seen before
  • Attacks targeting new pages or functionality

Normal Activity

  • Occasional low-severity blocks
  • Known scanner bots (blocked successfully)
  • Geographically distributed attacks (not coordinated)

Need Help?

  • 💬 Live Chat: Get help interpreting attack patterns
  • 📧 Email Support: Send suspicious log entries for analysis
  • 📞 Security Hotline: Emergency response for active attacks