Cybersecurity Ops with bash - Chapter 8 Solutions

Below are selected solutions for the Chapter 8 workshop questions from Cybersecurity Ops with bash.

Question 4

Modify to allow the user to specify the Windows log to be monitored by passing in a command-line argument.


The first line of code in identifies the Application log as the one that will be monitored.

The first line can be replace with the following:

This will use the value of the first argument passed to the script as the log to monitor. If no argument is provided it will default to Application.

129 views0 comments

© 2020 by Paul Troncone and Carl Albing