SavitarX
Ctrlk
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • SOC Analyst
        • Security Monitoring & SIEM Fundamentals
        • Windows Event Logs & Finding Evil
        • Introduction to Threat Hunting & Hunting With Elastic
        • Understanding Log Sources & Investigating with Splunk
        • Windows Attacks & Defense
        • Intro to Network Traffic Analysis
        • Intermediate Network Traffic Analysis
        • Working with IDS/IPS
        • Introduction to Malware Analysis
        • YARA & Sigma for SOC Analysts
        • Introduction to Digital Forensics
        • Detecting Windows Attacks with Splunk
          • Detecting Common User/Domain Recon
          • Detecting Password Spraying
          • Detecting Responder-like Attacks
          • Detecting Kerberoasting/AS-REProasting
          • Detecting Pass-the-Hash
          • Detecting Pass-the-Ticket
          • Detecting Overpass-the-Hash
          • Detecting Golden Tickets/Silver Tickets
          • Detecting Unconstrained Delegation/Constrained Delegation Attacks
          • Detecting DCSync/DCShadow
          • Creating Custom Splunk Applications
          • Detecting RDP Brute Force Attacks
          • Detecting Beaconing Malware
          • Detecting Nmap Port Scanning
          • Detecting Kerberos Brute Force Attacks
          • Detecting Kerberoasting
          • Detecting Golden Tickets
          • Detecting Cobalt Strike's PSExec
          • Detecting Zerologon
          • Detecting Exfiltration (HTTP)
          • Detecting Exfiltration (DNS)
          • Detecting Ransomware
      • DFIR
    • Web Pentesting
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
Powered by GitBook
On this page
  1. CERTIFICATIONS & notes
  2. Blue Team
  3. SOC Analyst

Detecting Windows Attacks with Splunk

Detecting Common User/Domain ReconDetecting Password SprayingDetecting Responder-like AttacksDetecting Kerberoasting/AS-REProastingDetecting Pass-the-HashDetecting Pass-the-TicketDetecting Overpass-the-HashDetecting Golden Tickets/Silver TicketsDetecting Unconstrained Delegation/Constrained Delegation AttacksDetecting DCSync/DCShadowCreating Custom Splunk ApplicationsDetecting RDP Brute Force AttacksDetecting Beaconing MalwareDetecting Nmap Port ScanningDetecting Kerberos Brute Force AttacksDetecting KerberoastingDetecting Golden TicketsDetecting Cobalt Strike's PSExecDetecting ZerologonDetecting Exfiltration (HTTP)Detecting Exfiltration (DNS)Detecting Ransomware
PreviousPractical Digital Forensics ScenarioNextDetecting Common User/Domain Recon