Investigate an Infected Machine with Splunk | TryHackMe Benign
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded to the…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used…
Introduction In this video walkthrough, we covered Active Directory penetration testing and Privilege Escalation through techniques such as ASREProsting…
Introduction In this video walkthrough, we covered investigating a compromised endpoint by going over the malicious events. Part of…
Premise In this video, we covered FTP investigation using splunk search queries. We used data from TryHackMe Splunk 2…
Premise In this video walkthrough, we covered investigating malware / ransomware usb attacks with splunk to unleash artifacts related…
Premise In this video walkthrough, we covered part 2 of using Splunk in a security operation center. We investigated…
Premise In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe Splunk 2…
Premise In this video walkthrough, we covered how to investigate the Cerber Ransomware and find its related artifacts in…