{"id":142,"date":"2022-04-28T06:36:47","date_gmt":"2022-04-28T06:36:47","guid":{"rendered":"https:\/\/cyberlorenzo.tech\/?p=142"},"modified":"2022-05-12T22:55:09","modified_gmt":"2022-05-12T22:55:09","slug":"splunk","status":"publish","type":"post","link":"https:\/\/cyberlorenzo.tech\/?p=142","title":{"rendered":"Splunk Basics"},"content":{"rendered":"\n<p>In this project I will be demonstrating my ability to utilize Splunk by configuring the event manager, sigma rules, and implementing alerts<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>This is the Splunk Enterprise homepage. I am currently using the &#8220;tryhackme&#8221; platform to access their virtual machine in the cloud. Let&#8217;s go ahead and get started by selecting <em>Add Data<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"399\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2-1024x399.png\" alt=\"\" class=\"wp-image-145\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2-1024x399.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2-300x117.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2-768x299.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2-1536x598.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-47-2.png 1996w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>From this page I selected the monitor option in order to configure the instance we will be using<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1-1024x400.png\" alt=\"\" class=\"wp-image-148\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1-1024x400.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1-300x117.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1-768x300.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1-1536x600.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-49-1.png 1878w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Here I am capable of monitoring various types of log files along with systems health performance.<\/p>\n\n\n\n<p>I selected Local Event Logs since I am using a pre-configured lab that has event logs downloaded on the local machine already<\/p>\n\n\n\n<p>I am specifically looking for PowerShell and Sysmon logs but I noticed that they are not listed in the &#8220;Available items&#8221; drop down menu.  To fetch the logs I need I will navigate over to the <code><mark style=\"background-color:#db4f3d\" class=\"has-inline-color\">Settings &gt; Data Inputs <\/mark><\/code><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1022\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-1024x1022.png\" alt=\"\" class=\"wp-image-150\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-1024x1022.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-300x300.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-150x150.png 150w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-768x767.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1-666x666.png 666w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-50-1.png 1158w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>As you can see, there are a plethora of logs we can choose from now. I suggest using the <code><mark style=\"background-color:#db4f3d\" class=\"has-inline-color has-white-color\">CTRL + F<\/mark><\/code> keys to search quickly for the types of logs you may be searching for.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"371\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-1024x371.png\" alt=\"\" class=\"wp-image-151\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-1024x371.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-300x109.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-768x279.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-1536x557.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-52-2048x743.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The Event log collections has successfully been configured to my needs, now I will upload the the log files from the local machine and run some basic search filters <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"970\" height=\"437\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-53-1.png\" alt=\"\" class=\"wp-image-154\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-53-1.png 970w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-53-1-300x135.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-53-1-768x346.png 768w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>What you are looking at here is essentially just a default search that tells us how many total events we have in this instance<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54-1024x568.png\" alt=\"\" class=\"wp-image-156\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54-1024x568.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54-300x166.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54-768x426.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54-1536x851.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-54.png 1853w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>If I would like to specify a certain source or source type I would just specify that in the spacebar like so<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"593\" height=\"497\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-55-1.png\" alt=\"\" class=\"wp-image-157\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-55-1.png 593w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-55-1-300x251.png 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Now for a more practical example of how to use the search feature, we are going to query some failed password attempts by entering <code><mark style=\"background-color:#db4f3d\" class=\"has-inline-color\">* \"failed password events for sneezy\"<\/mark><\/code><\/p>\n\n\n\n<p>This reveals some pretty alarming information to me. There are 84 failed password attempts from various different types of IP addresses. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"927\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-59-1024x927.png\" alt=\"\" class=\"wp-image-159\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-59-1024x927.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-59-300x271.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-59-768x695.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-59.png 1241w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Sigma Rules &#8211; Threat Detection Sharing<\/h3>\n\n\n\n<p>Lets talk about Sigma rules. The platform uncoder.io allows its users to translate rulesets from one SIEM platform to another. Sigma rules themselves are essentially just baseline rulesets that all of the SIEM&#8217;s have in common. This is highly effective when sharing detection methods and eliminates vendor lock-in<\/p>\n\n\n\n<p>As demonstrated below,  the sigma rule is selected and then translated into whichever SIEM query language you need to search the log files<\/p>\n\n\n\n<p><a href=\"https:\/\/uncoder.io\">https:\/\/uncoder.io<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"661\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63-1024x661.png\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63-1024x661.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63-300x194.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63-768x496.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63-1536x991.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-63.png 1818w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this project I will be demonstrating my ability to utilize Splunk by configuring the event manager, sigma rules, and implementing alerts This is the Splunk Enterprise homepage. I am currently using the &#8220;tryhackme&#8221; platform to access their virtual machine in the cloud. Let&#8217;s go ahead and get started by selecting Add Data From this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"saved_in_kubio":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-project-two"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=142"}],"version-history":[{"count":6,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/142\/revisions"}],"predecessor-version":[{"id":167,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/142\/revisions\/167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}