The anatomy of proxy logs
The proxy generates comprehensive logs that contain a wealth of valuable information. By gaining a deep understanding of these logs and the insights they provide, you will be able to effectively investigate and detect several malicious activities.
To provide a comprehensive explanation, we will utilize a log sample generated from Blue Coat, a commercial web proxy. While it is important to note that various proxies may differ slightly in log structure and details, the concepts and insights discussed here are applicable across different proxy solutions:
Bluecoat|src=10.10.10.10|srcport=50639|dst=65.254.244.180|dstport=443|username=mostafa.yahia|devicetime=[25/10/2018:14:16:16 GMT]|s-action =TCP_Denied|sc-status=407|cs-method=GET|time-taken=256|sc-bytes=1307|cs-bytes=953|cs-uri-scheme=https|cs-host=Domain.org|cs-uri-path=/login.htm | cs-uri-extension=htm|cs-auth-group=Domain name\Admins|rs(Content-Type)=application/json;%20charset=utf-8|cs(User-Agent)=Mozilla...