
Understanding Log Sources & Investigating with Splunk

Project URL: https://github.com/most-e/Splunking-Into-Intrusion-Detection
Project Description:
I recently completed an intensive Hack the Box module focused on Splunk, a leading platform in the realm of cybersecurity analytics and threat detection. This project provided me with a deep dive into Splunk's architecture, components, and core functionalities, equipping me with a robust understanding of its capabilities. I did an entire write up on this project in the Github link above.
Overview:
A major focus was on crafting effective detection-related SPL (Search Processing Language) searches, which are essential for Splunk's querying capabilities. Through practical exercises and tutorials, I gained proficiency in creating targeted searches to identify security incidents, anomalies, and potential threats. To reinforce the practical application of Splunk as a Security Information and Event Management (SIEM) tool, the module presented real-world scenarios. These scenarios allowed me to act as a security analyst, investigating simulated security incidents using Splunk. This hands-on experience helped me navigate through large volumes of machine data, leverage Splunk's search capabilities, and apply various data analysis techniques. Additionally, the module covered the creation of TTP-driven and analytics-driven SPL searches. TTP-driven searches involved crafting queries aligned with known Tactics, Techniques, and Procedures used by threat actors, enabling proactive detection and response to sophisticated attacks. Analytics-driven searches leveraged statistical analysis and mathematical models to identify abnormal behaviors and anomalies indicative of potential security breaches. Throughout the module, I gained valuable insights into using Splunk as a robust security monitoring and incident investigation tool. I developed the skills needed to identify and understand ingested data and available fields within Splunk.
Key Learning Objectives:
- Understanding Splunk's architecture, components, and core functionalities.
- Proficiency in crafting effective detection-related SPL searches.
- Practical application of Splunk as a SIEM tool in investigating security incidents.
- Creation of TTP-driven and analytics-driven SPL searches.
- Skills in using Splunk for security monitoring and incident investigation.
Hands-On Practice:
The module included sections with hands-on exercises to practice the techniques covered. It concluded with a practical skills assessment to gauge understanding. Learners could reproduce detection examples provided in the interactive sections or their virtual machines.
Module Details:
- Classification: Hard
- Prerequisites: Basic knowledge of Windows event logs and common attack principles
- Duration: Self-paced, start and stop anytime
- Assessment: Completion of all exercises and skills assessment required for marking the module as complete