Splunk
Description: SIEM with advanced functionality
Installation: download from https://www.splunk.com/en_us/products/splunk-enterprise.html
Usage
Starting Splunk on Linux
If not a service:
sudo /opt/splunk/bin/splunk start
If running as a service:
sudo systemctl start Splunkd
Basic Search Queries
Search source IP field (src) and the IP address value 10.10.10.50:
search src="10.10.10.50"
Search desttination IP field (dst):
search dst="10.10.100.5"
Search source IP field (src) and destination IP field (dst) the IP address value 10.10.10.50:
search src="10.10.10.50" OR dst="10.10.10.50"
Search source IP field (src) to any destination IP field (dst) on the 10.10.10.0/24:
search src="10.10.10.73" dst="10.10.10.*"
Simple failed login failure search:
search pass* AND fail*
Show executables denerated from process, in this case cmd.exe, from Sysmon logs:
index="botsv1" earliest=0 Image="*\\cmd.exe" | stats values(CommandLine) by host
Search for newly created windows user: search eventID field for 4270 or "net user"
Search for windows user logins: search eventID field for 4624
To search for web scanners:
index=index_name sourcetype=stream:http src_ip=xxx.xxx.xxx.xxx | stats count by src_headers | sort -count | head 3
Search for .exe:
index=botsv1 sourcetype=stream:http dest_ip="xxx.xxx.xxx.xxx" *.exe
To display search results in reverse chronological order:
| reverse
Advanced SPL Examples (more can be found at https://github.com/EvolvingSysadmin/Splunk-Tools)
Search for credentials submitted to form:
To get metadata information on sourcetypes or other fields in an index:
List all values within a field (eg sourcetype or source):
Time of crypto mining on host (fss = mining start fes = mining stop)
Search for IAM key of account that generated most distinct errors:
To detect syn scanning:
Last updated