You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,11 +24,12 @@ The only argument to the script is path to apache log file, which needs to have
24
24
25
25
### Usage
26
26
#### Check requests identified as maliceous:
27
-
To fine-tune regular expressions for the legal paths, run the script with -i option. The option takes no arguments and will stop the script after *requests_maliceous* file is generated. You can inspect it with:
27
+
To fine-tune regular expressions for the legal paths, run the script with -i option. The option takes no arguments and will stop the script after *requests_maliceous* file is generated. You can inspect it with grep:
This way you can see if your LEGAL_PATH_IN_QUESTION has made it to the maliceous list.
32
+
This way you can see if your LEGAL_PATH_IN_QUESTION together with its associated IP address has made it to the maliceous list.
32
33
33
34
#### Run inside container:
34
35
This example emphasizes use of Linux capabilities for the default root user inside the container. Without these capabilities, manipulations of iptables will not work.
0 commit comments