Spear Phishing Detection with Splunk

In the previous walkthrough, Uncovering Hidden Threats with Splunk, we discovered that a threat actor was probing our organization’s website, froth.ly during the reconnaissance stage of their attack. We learned that they successfully accessed and downloaded an unsecured spreadsheet file containing the contact information of the organization’s employees. With this information, the threat-actor can launch a coordinated spear-phishing campaign aimed…

Read More

Uncovering Hidden Threats with Splunk

Reconnaissance is the initial phase of cyber threat hunting, where hunters gather information about the network, systems, and potential vulnerabilities. This phase is critical in identifying potential entry points for attackers and understanding the attack surface. Effective reconnaissance involves analyzing network traffic, system logs, and endpoint data to identify anomalies and potential security gaps. In this walkthrough, we will use…

Read More

Installing Splunk Enterprise on Kali Linux

This is a basic tutorial on how to install the free-trial version of Splunk Enterprise on your Kali Linux machine.  At the time of writing, splunk-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb is the most recent kernal. Your install might be a different file name. Signup for Free trial of Splunk – https://www.splunk.com/en_us/download/splunk-enterprise.html Download the installation package. Choose .deb if you are using a Kali Linux…

Read More