Summary
In this chapter, we discussed some of the most common web attacks, such as code injection, SQL injection, path traversal, and XSS attacks, and how to investigate web application threats by analyzing WAF logs. Also, we discussed how to detect and investigate suspicious external access to remote services such as the VPN, RDP, mailboxes, and web services.
In the next chapter, we will learn how to investigate network device flows and security solutions alerts.