# Using Splunk Applications

## Splunk Applications

Splunk applications, or apps, are packages that we add to our Splunk Enterprise or Splunk Cloud deployments to extend capabilities and manage specific types of operational data. Each application is tailored to handle data from specific technologies or use cases, effectively acting as a pre-built knowledge package for that data. Apps can provide capabilities ranging from custom data inputs, custom visualizations, dashboards, alerts, reports, and more.

In this segment, we'll be leveraging the `Sysmon App for Splunk` developed by Mike Haag.

To download, add, and use this application, follow the steps delineated below:

1. Sign up for a free account at [splunkbase](https://splunkbase.splunk.com/)

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FXRjbstemWTQomXMMW1st%2F116.webp?alt=media&#x26;token=053fdadb-5380-4474-8008-2bc87aec3af0" alt=""><figcaption></figcaption></figure>

2. Once registered, log into your account
3. Head over to the [Sysmon App for Splunk](https://splunkbase.splunk.com/app/3544) page to download the application.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FjBW7MMU4e9gwQkwz88Zs%2F117.webp?alt=media&#x26;token=45610a01-de1a-4d65-873f-8ba6a746717f" alt=""><figcaption></figcaption></figure>

4. Add the application as follows to your search head.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FX4Qt6T5jKqNJZcUQpLO1%2F118.webp?alt=media&#x26;token=026b5c3f-90cb-4212-aa38-7ff37a632567" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FUV54OguaN2h6yokDBS5m%2F119.webp?alt=media&#x26;token=55490097-2937-4a1b-8466-a056c73e9270" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FZllUeIeDO0rIRQPXkVcH%2F120.webp?alt=media&#x26;token=4d66d124-e76b-4705-95fb-7e51ced11e4b" alt=""><figcaption></figcaption></figure>

5. Adjust the application's [macro](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Definesearchmacros) so that events are loaded as follows.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FtXIJGaKYJDYqm4Gq7rIY%2F121.webp?alt=media&#x26;token=ae85c0e1-4269-4717-b986-763393e88c38" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FO18r61Pj5aLMcRrjfLZd%2F122.webp?alt=media&#x26;token=8d813d6d-becf-46e9-802f-0a77afa8a4bd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FRMmn5tiJV9HAubw9nm9o%2F123.webp?alt=media&#x26;token=e0c73bb7-3e59-4056-b04d-dee42c5bff4f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F0YjW56ytdISZGVe5cgiA%2F124.webp?alt=media&#x26;token=8ed48884-1a81-42dd-9310-3f676f683f5e" alt=""><figcaption></figcaption></figure>

Let's access the Sysmon App for Splunk by locating it in the "Apps" column on the Splunk home page and head over to the `File Activity` tab.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FTcnWA5zczqQebeSGPqEq%2F125.webp?alt=media&#x26;token=88ca5a43-1722-47f4-b529-bed5612c9b2c" alt=""><figcaption></figcaption></figure>

Let's now specify "All time" on the time picker and click "Submit". Results are generated successfully; however, no results are appearing in the "Top Systems" section.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F1dmRBiT1yP06wJ3lLXQE%2F126.webp?alt=media&#x26;token=1b7db19d-06a4-48aa-a116-d10c4b578e82" alt=""><figcaption></figcaption></figure>

We can fix that by clicking on "Edit" (upper right hand corner of the screen) and editing the search.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F6YWdJAWcV1WCpFq46d49%2F127.webp?alt=media&#x26;token=4e338a86-3a7b-4342-a260-3920b069223c" alt=""><figcaption></figcaption></figure>

The Sysmon Events with ID 11 do not contain a field named `Computer`, but they do include a field called `ComputerName`. Let's fix that and click "Apply"

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FCPNd5wo4rHsjJAgTQOPn%2F128.webp?alt=media&#x26;token=7c501154-acba-42fa-b392-7b027d279080" alt=""><figcaption></figcaption></figure>

Results should now be generated successfully in the "Top Systems" section.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FnjRwR1ncHtfCeFOk4INW%2F129.webp?alt=media&#x26;token=1badfa60-ae08-4541-bb3a-339448b818b2" alt=""><figcaption></figcaption></figure>

## Practical Exercises

1\) Access the Sysmon App for Splunk and go to the "Reports" tab. Fix the search associated with the "Net - net view" report and provide the complete executed command as your answer. Answer format: net view /Domain:\_.local

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FacJzB7RiE0w1Co7TOkf1%2FScreenshot(1).png?alt=media&#x26;token=c6deda9d-6cfc-4f2c-8cea-2a29124f4d91" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F0wlpzRCMfPaaQudqDpOb%2FScreenshot(2).png?alt=media&#x26;token=9aaf71a5-98ee-4917-8966-0f79c7b5b915" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FgeXnX5uCXieKiCO5Vuhn%2FScreenshot(3).png?alt=media&#x26;token=1097b665-c200-4f44-9b86-02f91863d612" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FRPJUbB44AeYgaRchP5aP%2FScreenshot(4).png?alt=media&#x26;token=72292e07-4fb5-49d9-b451-505ca6b5b659" alt=""><figcaption></figcaption></figure>

Answer:  net view /DOMAIN:uniwaldo.local

2\) Access the Sysmon App for Splunk, go to the "Network Activity" tab, and choose "Network Connections". Fix the search and provide the number of connections that SharpHound.exe has initiated as your answer.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FoqLRC4S2QWkSyt2uPsvp%2FScreenshot(5).png?alt=media&#x26;token=45286ae0-c2fa-4e1f-86b9-505d31c98d1e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2Fifz25Yo97MT03yrel5EC%2FScreenshot(6).png?alt=media&#x26;token=795d981d-07f9-4dfb-a8d9-dc4acf0e7d15" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FP2dzvR9H1HSTFNmZ8jC3%2FScreenshot(7).png?alt=media&#x26;token=4f678b4f-f399-405a-8324-04a98360a0d1" alt=""><figcaption></figcaption></figure>

```
sysmon EventCode=3 Image="*SharpHound.exe" | stats count
```

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F9ZMLQ6pQrArBiJJKdm1U%2FScreenshot(8).png?alt=media&#x26;token=63d7a1ef-2c8f-4f36-8356-08a98e0d1e8b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FqHwFIiD6Q2gAlKQ5raKb%2FScreenshot(9).png?alt=media&#x26;token=843a22d7-6f04-4817-8fd9-41a186efe7d2" alt=""><figcaption></figcaption></figure>

Answer:  6
