SavitarX
search
⌘Ctrlk
LinkedinTryHackme
SavitarX
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • CDSA
        • Security Monitoring & SIEM Fundamentals
        • Windows Event Logs & Finding Evil
        • Introduction to Threat Hunting & Hunting With Elastic
        • Understanding Log Sources & Investigating with Splunk
        • Windows Attacks & Defense
        • Intro to Network Traffic Analysis
        • Intermediate Network Traffic Analysis
        • Working with IDS/IPS
        • Introduction to Malware Analysis
        • YARA & Sigma for SOC Analysts
        • Introduction to Digital Forensics
        • Detecting Windows Attacks with Splunk
          • Detecting Common User/Domain Recon
          • Detecting Password Spraying
          • Detecting Responder-like Attacks
          • Detecting Kerberoasting/AS-REProasting
          • Detecting Pass-the-Hash
          • Detecting Pass-the-Ticket
          • Detecting Overpass-the-Hash
          • Detecting Golden Tickets/Silver Tickets
          • Detecting Unconstrained Delegation/Constrained Delegation Attacks
          • Detecting DCSync/DCShadow
          • Creating Custom Splunk Applications
          • Detecting RDP Brute Force Attacks
          • Detecting Beaconing Malware
          • Detecting Nmap Port Scanning
          • Detecting Kerberos Brute Force Attacks
          • Detecting Kerberoasting
          • Detecting Golden Tickets
          • Detecting Cobalt Strike's PSExec
          • Detecting Zerologon
          • Detecting Exfiltration (HTTP)
          • Detecting Exfiltration (DNS)
          • Detecting Ransomware
      • DFIR
    • Web Pentesting
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CERTIFICATIONS & noteschevron-right
  2. Blue Teamchevron-right
  3. CDSA

Detecting Windows Attacks with Splunk

Detecting Common User/Domain Reconchevron-rightDetecting Password Sprayingchevron-rightDetecting Responder-like Attackschevron-rightDetecting Kerberoasting/AS-REProastingchevron-rightDetecting Pass-the-Hashchevron-rightDetecting Pass-the-Ticketchevron-rightDetecting Overpass-the-Hashchevron-rightDetecting Golden Tickets/Silver Ticketschevron-rightDetecting Unconstrained Delegation/Constrained Delegation Attackschevron-rightDetecting DCSync/DCShadowchevron-rightCreating Custom Splunk Applicationschevron-rightDetecting RDP Brute Force Attackschevron-rightDetecting Beaconing Malwarechevron-rightDetecting Nmap Port Scanningchevron-rightDetecting Kerberos Brute Force Attackschevron-rightDetecting Kerberoastingchevron-rightDetecting Golden Ticketschevron-rightDetecting Cobalt Strike's PSExecchevron-rightDetecting Zerologonchevron-rightDetecting Exfiltration (HTTP)chevron-rightDetecting Exfiltration (DNS)chevron-rightDetecting Ransomwarechevron-right
PreviousPractical Digital Forensics Scenariochevron-leftNextDetecting Common User/Domain Reconchevron-right