Incident Analysis with ELK Kibana | HTTP Logs Analysis | TryHackMe ItsyBitsy
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from a compromised…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from a compromised…
Introduction We covered the basic fundamentals of Splunk for beginners. We explored data collection through different methods including but…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows machines and…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded to the…
Introduction One of our web servers triggered an AV alert, but none of the sysadmins say they were logged…
Detecting DNS Fast Fluxing Domains Fast Flux is a technique that hides and conceals the real identity of the…