Investigating Conti Ransomware on Microsoft Exchange with Splunk | TryHackMe
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used…
Introduction In this video walkthrough, we covered Active Directory penetration testing and Privilege Escalation through techniques such as ASREProsting…
Introduction In this video walkthrough, we covered investigating a compromised endpoint by going over the malicious events. Part of…
Premise In this video, we covered FTP investigation using splunk search queries. We used data from TryHackMe Splunk 2…
Premise In this video walkthrough, we covered investigating malware / ransomware usb attacks with splunk to unleash artifacts related…
Premise In this video walkthrough, we covered part 2 of using Splunk in a security operation center. We investigated…
Premise In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe Splunk 2…
Premise In this video walkthrough, we covered how to investigate the Cerber Ransomware and find its related artifacts in…
Premise In this video walkthrough, we covered how to hunt and identify advanced persistent threat with Splunk by correlating…
Premise: In this video walkthrough, we covered the basic functions in Splunk such as the apps and the search…