Skip to content

Garpieln/Splunk-Detection-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

Splunk Detection Lab

Introduction

Overview

This lab's purpose was to gain hands on experience setting up an Windows Active Directory environment and utilizing some blue team related tools, including: a SIEM (Splunk); Sysmon logging forwarded to Splunk, and more planned in future additions to this project. The overall general set up included setting up 4 virtual machines; 2 servers, 2 desktops. One server acting as the Splunk logger, one server acting as the windows Active Directory Domain Controller, one desktop acting as the target windows machine that will join the Active Directory environment and be attacked by the last virtual machine, a kali linux used to conduct attacks on the target windows machine.

Objectives

  • Gain hands-on experience setting up an Active Directory environment.
  • Gain experience working with Splunk
  • Gain experience forwarding logs, and generating/inspecting telemetry

Skills Learned

  • Deployed Splunk Universal Forwarder agents on multiple virtual machines to forward logs

Template tools Used

  • Splunk
  • Atomic Red Team
  • Windows Active Directory
  • Mitre Attack Matrix
  • Virtualization
  • Sysmon Logging

Template Steps Used

Step One with image:
Disk Sanitization Steps

Step Two with image:
Disk Sanitization Steps

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published