Skip to main content
Room Banner
Back to all walkthroughs
Room Icon

Servidae: Log Analysis in ELK

Analyze the logs of an affected workstation to determine the attacker's indicators of compromise.

easy

60 min

12,545

To access material, start machines and answer questions login.

Ready to learn Cyber Security?

TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.