Using Splunk as an Offensive Security Tool

It’s important for both offensive and defensive security professionals to be aware of the attack vectors facing a Splunk deployment. This tutorial will show you some ways Splunk can be used as an offensive tool and the steps you can take to reduce the associated risks.

Read More



A User’s Guide to Setting up LDAP in Splunk

A User’s Guide to Setting up LDAP in Splunk

This tutorial will walk you through how to successfully configure and ultimately set up LDAP authentication in Splunk....

Read More
How to Splunk Data in Amazon S3

How to Splunk Data in Amazon S3

Do you have log files in AWS S3 that you would like to ingest into Splunk? This tutorial will walk you through...

Read More
On the Hunt Part 3: Getting Your Hands Dirty and Conclusion

On the Hunt Part 3: Getting Your Hands Dirty and Conclusion

The third part of the threat hunting series covers hands-on examples using basic process creation log queries to...

Read More
On the Hunt Part 2: Process Creation Log Analysis

On the Hunt Part 2: Process Creation Log Analysis

Part two of our threat hunting series shows basic queries for interrogating process creation logs in Splunk...

Read More
On the Hunt Part 1: Introduction to Process Creation Logs

On the Hunt Part 1: Introduction to Process Creation Logs

This tutorial helps you know where to start finding anomalous activity through the examination of process creation logs...

Read More
How to Set up Splunk HEC the Right Way

How to Set up Splunk HEC the Right Way

This tutorial will show you how to test and troubleshoot a Splunk HTTP Event Collector (HEC) configuration....

Read More


Close off Canvas Menu