Event Analysis and Logs Parsing with Splunk | TryHackMe Fixit
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
Introduction We covered the basic fundamentals of Splunk for beginners. We explored data collection through different methods…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities….
Introduction In this video walkthrough, we covered Active Directory penetration testing and Privilege Escalation through techniques such…