Intrustion Detection with Splunk
Ingesting Data Sources
Retrive all logs
index="main" earliest=0Searching Effectively
listing all our sourcetypes
index="main"
| stats count by sourcetype
Query for all Sysmon logs
Embracing The Mindset Of Analysts, Threat Hunters, & Detection Engineers
Listing All Sysmon EventCodes in the Dataset
Investigating Suspicious Parent-Child Processes
Filtering for High-Risk Processes (e.g., cmd.exe, powershell.exe)
cmd.exe, powershell.exe)Deep Dive into notepad.exe Spawning powershell.exe
notepad.exe Spawning powershell.exeTracking Suspicious IP (10.0.0.229)
10.0.0.229)Investigating Linux Host (waldo-virtual-machine)
waldo-virtual-machine)Finding Malicious Commands from the IP
Detecting DCSync Attacks (Active Directory Compromise)
Detecting LSASS Dumping (Credential Theft)
Investigating Suspicious notepad.exe Accessing LSASS
notepad.exe Accessing LSASSKey Takeaways
Creating Meaningful Alerts
Key Concepts
1. Identify All Call Traces with "UNKNOWN" (Shellcode Indicator)**
2. Group Suspicious Calls by Source Process
3. Filter Out Self-Accessing Processes
4. Exclude Known Benign Processes (JIT, .NET, WOW64)
5. Final High-Fidelity Alert Query
Tasks
task1

task2

task3
task4
task5

Last updated

