Event Analysis and Logs Parsing with Splunk | TryHackMe Fixit
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
Introduction to Splunk We covered the basic fundamentals of Splunk for beginners. We explored data collection through…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities….
Introduction In this video walkthrough, we covered Active Directory penetration testing and Privilege Escalation through techniques such…
Introduction In this video walkthrough, we covered investigating a compromised endpoint by going over the malicious events….
Overview: Focus areas include spear-phishing campaigns, encrypted traffic, unusual files, metadata analysis, and persistence mechanisms. The task…
Premise In this video walkthrough, we covered investigating malware / ransomware usb attacks with splunk to unleash…
Introduction In this post, we covered part 2 of using Splunk in a security operation center. We…
Premise In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe…
Premise The video is a technical walkthrough focused on using Splunk to investigate a ransomware attack scenario….
Premise In this video walkthrough, we covered how to hunt and identify advanced persistent threat with Splunk…
Premise: In this video walkthrough, we covered the basic functions in Splunk such as the apps and…