Splunk 101

    • Virtual machine deployed.

    No Answer

    • I'm ready to look at Splunk apps. 

    No Answer

    • What is the 'Folder name' for the add-on? 

    Install the app on the desktop : splunk-add-on-for-microsoft-sysmon_1062.tgz then navigate to the apps :


     Answer : TA-microsoft-sysmon

    • What is the Version?

     Answer : 10.6.2

    • Upload the Splunk tutorial data on the desktop. How many events are in this source?

    Upload >zip file on desktop > next > submit > search


    Answer : 109,864

    • Use Splunk to Search for the phrase 'failed password' using tutorialdata.zip as the source. 

    No Answer.

    • What is the sourcetype?


    Answer : www1/secure

    • In the search result, look at the Patterns tab.

    No Answer.

    • What is the last username in this tab?


    Answer : myuan

    • Search for failed password events for this specific username. How many events are returned?


    Answer : 16

    • Use the Select document feature. What is the Splunk query for 'sigma: APT29'? 


    Answer : CommandLine="*-noni -ep bypass $$*

    • Use the Github Sigma repo. What is the Splunk query for 'CACTUSTORCH Remote Thread Creation'?

    By the hint : Check the Windows rules. Copy and paste into uncoder.io.

    GO to this repo in the windows part related to thread : https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_remote_thread

    Then copy the code of "sysmon_cactustorch.yml" into encoder.io to translate the rule in splunk.

    Answer : (source="WinEventLog:*" (SourceImage="*\\System32\\cscript.exe" OR SourceImage="*\\System32\\wscript.exe" OR SourceImage="*\\System32\\mshta.exe" OR SourceImage="*\\winword.exe" OR SourceImage="*\\excel.exe") TargetImage="*\\SysWOW64\\*" NOT StartModule="*")

    • What is the highest EventID?

      Answer : 11

    TASK 8 : Alerts
    • I have a general understanding on how to create an alert in Splunk. 

    No Answer.

    • I know the fundamentals of Splunk. 

    No Answer.