FaresMorcy
search
⌘Ctrlk
FaresMorcy
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
    • Security Monitoring & SIEM Fundamentals Module
    • Windows Event Logs & Finding Evil Module
    • Introduction to Threat Hunting & Hunting With Elastic Module
    • Understanding Log Sources & Investigating with Splunk Module
      • Introduction To Splunk & SPL
      • Using Splunk Applications
      • Intrusion Detection With Splunk (Real-world Scenario)
      • Detecting Attacker Behavior With Splunk Based On TTPs
      • Detecting Attacker Behavior With Splunk Based On Analytics
      • Skills Assessment
    • Windows Attacks & Defense
    • Intro to Network Traffic Analysis Module
    • YARA & Sigma for SOC Analysts Module
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. SOC Hackthebox Notes & Labs

Understanding Log Sources & Investigating with Splunk Module

Introduction To Splunk & SPLchevron-rightUsing Splunk Applicationschevron-rightIntrusion Detection With Splunk (Real-world Scenario)chevron-rightDetecting Attacker Behavior With Splunk Based On TTPschevron-rightDetecting Attacker Behavior With Splunk Based On Analyticschevron-rightSkills Assessmentchevron-right
PreviousIntroduction to Threat Hunting & Hunting With Elastic Modulechevron-leftNextIntroduction To Splunk & SPLchevron-right

Last updated 1 year ago