Premise
In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe Splunk 2 100 series questions.
Splunk SIEM Full Course with Practical Scenarios
Introduction
The challenge involves an investigation of an employee, Amber Turing, who was involved in contacting a competitor after a failed acquisition attempt. The goal is to use Splunk to investigate logs and uncover key details about her activities.The investigation starts by analyzing Palo Alto firewall logs and other sources in Splunk.
Finding Amber Turing’s IP Address
The first step is to locate Amber Turing’s IP address by filtering the Palo Alto firewall traffic logs. By searching for her name in the logs, the investigator identifies her source IP address.
Identifying the Website She Visited
After obtaining Amber’s IP address, the investigator queries the HTTP logs in Splunk to find which websites she visited. By filtering through the HTTP logs using Amber’s IP, a list of websites is generated.To remove irrelevant results (e.g., Microsoft, Google, etc.), a filtering technique is applied using specific conditions to clean up the list and identify the competitor’s website.
Finding the Image File Containing Executive Contact Information
Amber was interested in contacting a specific executive from the competitor company. After identifying the website she visited, the investigation narrows down the logs to look for any image files that contain contact information.The relevant URI path (URL) containing the image file is found in the HTTP logs, indicating that she viewed an image with executive contact information.
Finding the CEO’s Name
To uncover the CEO’s name, the investigator switches to analyzing SMTP email logs in Splunk.By searching for Amber’s email address and filtering the logs for communication between her and the competitor company, the investigator looks for relevant emails that may contain the CEO’s name.
Conclusion
The video concludes with further analysis of email logs to complete the investigation and answer additional questions about the communication between Amber and the competitor.
TryHackMe Splunk 2 Boss of the SOC V2 | Room Answers
Amber found the executive contact information and sent him an email. What image file displayed the executive’s contact information? Answer example: /path/image.ext
What is the CEO’s name? Provide the first and last name.
What is the CEO’s email address?
After the initial contact with the CEO, Amber contacted another employee at this competitor. What is that employee’s email address?
What is the name of the file attachment that Amber sent to a contact at the competitor?
What is Amber’s personal email address?