Posts filed under: Splunk

Splunk

Spear Phishing Detection with Splunk

In the previous walkthrough, Uncovering Hidden Threats with Splunk, we discovered that a threat actor was probing our organization’s website, froth.ly during the reconnaissance stage of their attack. We learned that they successfully accessed and downloaded an unsecured spreadsheet file... Read More

Uncovering Hidden Threats with Splunk

Reconnaissance is the initial phase of cyber threat hunting, where hunters gather information about the network, systems, and potential vulnerabilities. This phase is critical in identifying potential entry points for attackers and understanding the attack surface. Effective reconnaissance involves analyzing... Read More

Installing Splunk Enterprise on Kali Linux

This is a basic tutorial on how to install the free-trial version of Splunk Enterprise on your Kali Linux machine.  At the time of writing, splunk-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb is the most recent kernal. Your install might be a different file name. Signup... Read More