ESC
Start typing to search...

SIEM

Honeypots

Honeypot Diaries: SSH Authorized Keys

Analyzing threat actor activity and malware observed in geographically dispersed honeypots.

Apr 16, 2023 4 min read
SIEM

Migrating Splunk Storage to S3 SmartStore

A short guide on how I transitioned an existing Splunk deployment to S3 SmartStore to decouple and scale storage.

Apr 01, 2023 6 min read
Information Security

Ingesting PCAP Files with Zeek and Splunk

How to safely ingest and analyze pcap files at scale using Zeek and Splunk.

Feb 01, 2022 8 min read
Information Security

Blue Team Tactics: Honey Tokens Pt. III

The final installment of the honey tokens series, covering multiple methods to centralize Windows Event ID 4663 audit logs including PowerShell, WEF, Splunk Universal Forwarders, and Splunk search queries.

Oct 01, 2020 6 min read
Network Security

DIY IP Threat Feed

This post describes building a DIY IP threat feed by aggregating honeypot SSH login data in Splunk, enriching it with geo and reputation context, and exporting it as a regularly updated CSV blacklist.

Apr 30, 2020 3 min read
System Administration

Deploying Splunk Universal Forwarders via GPO

A guide to deploying the Splunk Universal Forwarder across Windows endpoints using a Group Policy Object and an Orca-generated MST transform file containing the deployment server and credentials.

Mar 28, 2020 3 min read
SIEM

Tracking SSH Brute-force Logins with Splunk

This post demonstrates using Splunk field extraction and search queries to track SSH brute-force login attempts, identifying the top attacking usernames and source IP addresses via dashboards.

Jun 13, 2018 3 min read