ESC
Start typing to search...

Splunk

Honeypots

Honeypot Diaries: SSH Authorized Keys

Analyzing threat actor activity and malware observed in geographically dispersed honeypots.

Apr 16, 2023 4 min read
SIEM

Migrating Splunk Storage to S3 SmartStore

A short guide on how I transitioned an existing Splunk deployment to S3 SmartStore to decouple and scale storage.

Apr 01, 2023 6 min read
Network Security

Detecting Default Meterpreter HTTPS Listeners

Detecting default Meterpreter HTTPS listeners by fingerprinting TLS certificate metadata, cipher suites, and HTTP response bodies using Nmap, Zeek, Splunk, and Elastic.

Jul 31, 2022 7 min read
Honeypots

Honeypot Diaries: Masscan

A honeypot observations post documenting a threat actor attempting to install and use the masscan port scanner on a compromised host to scan for RDP and SSH targets, with SSH hardening mitigations.

Jun 06, 2022 8 min read
Information Security

Ingesting PCAP Files with Zeek and Splunk

How to safely ingest and analyze pcap files at scale using Zeek and Splunk.

Feb 01, 2022 8 min read
Honeypots

Honeypot Diaries: Dota Malware

A deep dive into detecting and analyzing the Dota malware campaign.

Nov 01, 2020 8 min read
Information Security

Blue Team Tactics: Honey Tokens Pt. III

The final installment of the honey tokens series, covering multiple methods to centralize Windows Event ID 4663 audit logs including PowerShell, WEF, Splunk Universal Forwarders, and Splunk search queries.

Oct 01, 2020 6 min read
Automation

Load Balancing a Splunk Search Head Cluster

A guide to using an Ansible playbook to deploy and configure Nginx as a TLS-terminating load balancer in front of a Splunk Search Head Cluster for high availability and a single user entry point.

Jul 31, 2020 3 min read
SIEM

FreeIPA integration with Splunk

This post walks through integrating Splunk authentication with FreeIPA LDAP by creating a bindDN system account and configuring LDAP settings in both the Splunk web UI and an authentication.conf app.

Jun 30, 2020 4 min read
Network Security

DIY IP Threat Feed

This post describes building a DIY IP threat feed by aggregating honeypot SSH login data in Splunk, enriching it with geo and reputation context, and exporting it as a regularly updated CSV blacklist.

Apr 30, 2020 3 min read
System Administration

Deploying Splunk Universal Forwarders via GPO

A guide to deploying the Splunk Universal Forwarder across Windows endpoints using a Group Policy Object and an Orca-generated MST transform file containing the deployment server and credentials.

Mar 28, 2020 3 min read
Home Lab

Replacing the Default Splunk Web SSL Certificate

A step-by-step guide to generating an OpenSSL CSR, signing it with a pfSense Root CA, and configuring Splunk Web to use the resulting certificate chain via web.conf.

Nov 06, 2019 2 min read
SIEM

Tracking SSH Brute-force Logins with Splunk

This post demonstrates using Splunk field extraction and search queries to track SSH brute-force login attempts, identifying the top attacking usernames and source IP addresses via dashboards.

Jun 13, 2018 3 min read
Technology

Running an Authoritative DNS Server

This post covers running a self-hosted BIND9 authoritative DNS server on FreeBSD, with examples of reconnaissance attempts seen in query logs and Splunk-based analytics.

Feb 19, 2018 3 min read