Understanding Log Sources & Investigating with Splunk

Project URL: https://github.com/most-e/Splunking-Into-Intrusion-Detection

Project Description:

I recently completed an intensive Hack the Box module focused on Splunk, a leading platform in the realm of cybersecurity analytics and threat detection. This project provided me with a deep dive into Splunk's architecture, components, and core functionalities, equipping me with a robust understanding of its capabilities. I did an entire write up on this project in the Github link above.

Overview:

A major focus was on crafting effective detection-related SPL (Search Processing Language) searches, which are essential for Splunk's querying capabilities. Through practical exercises and tutorials, I gained proficiency in creating targeted searches to identify security incidents, anomalies, and potential threats.

To reinforce the practical application of Splunk as a Security Information and Event Management (SIEM) tool, the module presented real-world scenarios. These scenarios allowed me to act as a security analyst, investigating simulated security incidents using Splunk. This hands-on experience helped me navigate through large volumes of machine data, leverage Splunk's search capabilities, and apply various data analysis techniques.

Additionally, the module covered the creation of TTP-driven and analytics-driven SPL searches. TTP-driven searches involved crafting queries aligned with known Tactics, Techniques, and Procedures used by threat actors, enabling proactive detection and response to sophisticated attacks. Analytics-driven searches leveraged statistical analysis and mathematical models to identify abnormal behaviors and anomalies indicative of potential security breaches.

Throughout the module, I gained valuable insights into using Splunk as a robust security monitoring and incident investigation tool. I developed the skills needed to identify and understand ingested data and available fields within Splunk.

Key Learning Objectives:

  • Understanding Splunk's architecture, components, and core functionalities.
  • Proficiency in crafting effective detection-related SPL searches.
  • Practical application of Splunk as a SIEM tool in investigating security incidents.
  • Creation of TTP-driven and analytics-driven SPL searches.
  • Skills in using Splunk for security monitoring and incident investigation.

Hands-On Practice:

The module included sections with hands-on exercises to practice the techniques covered. It concluded with a practical skills assessment to gauge understanding. Learners could reproduce detection examples provided in the interactive sections or their virtual machines.

Module Details:

  • Classification: Hard
  • Prerequisites: Basic knowledge of Windows event logs and common attack principles
  • Duration: Self-paced, start and stop anytime
  • Assessment: Completion of all exercises and skills assessment required for marking the module as complete

Conclusion:

This project was a significant step in my journey to expand my skills and knowledge in cybersecurity, particularly in leveraging Splunk for advanced security operations.