Have you SIEM?
Description
It’s almost Christmas in Wareville, and the team of The Best Festival Company (TBFC) is busy preparing for the big celebration. Everything is running smoothly until the SOC dashboard flashes red. A ransom message suddenly appears:
The message comes from King Malhare, the jealous ruler of HopSec Island, who’s tired of Easter being forgotten. He’s sent his Bandit Bunnies to attack TBFC’s systems and turn Christmas into his new holiday, EAST-mas.
With McSkidy missing and the network under attack, the TBFC SOC team will utilize Splunk to determine how the ransomware infiltrated the system and prevent King Malhare’s plan from being compromised before Christmas.
Walkthrough
We are presented with direct link to the splunk instance. Emedeatley we check sourcetype from the left panel to see the available datasets, while selecting the all time logs in the "main" index.

We have web traffic logs and firewall logs.
Search for days that had abnormal amount of logs.

And we get a clear picture that period from 10.10 - 14.10 had abnormal amount of traffic indicating that the attack has been during that period.
Now selecting user)Agent field from the left bar we get insight apart from the legitimate Mozzila agents, some other as well.

And by selecting the client_pi field we can see one particilar ip addres standing out.

And adding the path field to see visited url's is a;ways ussefull to examine.
With all that info, we can now think of a SPL query that will narrow down the noise form the logs.
Lets exclude the common user agents first
And we will see that the logs show are coming 100% of them from the ip addres 198.51.100.55
See some initial probig of common config files:
Change the query so that we see count of resource redirects.

Search for the common sql inj attack
And see if there were any exfiltrations.
We can throw a look also in the firewall logs using the destination addres of the server and the source 198.51.100.55 in a table view

We can see and established connection to a C2 server.
Since the question ask for the abount of data transferred, se can use the query below:

From the information above, we can answer the required questions.
Questions
What is the attacker IP found attacking and compromising the web server?
198.51.100.55
Which day was the peak traffic in the logs? (Format: YYYY-MM-DD)
2025-10-12
What is the count of Havij user_agent events found in the logs?
933
How many path traversal attempts to access sensitive files on the server were observed?
658
Examine the firewall logs. How many bytes were transferred to the C2 server IP from the compromised web server?
126167
Last updated

