Coder Social home page Coder Social logo

google-cybersecurity-querying-splunk's Introduction

Documentation: Querying with Splunk #01

1. Introduction

Purpose: Document my experience and share knowledge on the Google cybersecurity certificate program Scope: Learn the foundations of cybersecurity and prepare for a career as a cybersecurity analyst

2. Setup

  • Environment: Windows OS, Brave browser, and Splunk Cloud
  • Accounts and Access: Google, coursera, and splunk accounts

3. Challenge Walkthrough

3.1 Lesson: SIEM Tools

  • Objective: Perform a query with Splunk to locate failed SSH login(s) for the root account

3.2: Procedure

  • Download tutorialdata.zip file image

  • Click Add data image

  • Click upload image

  • Select a file and select tutorialdata.zip then click next image

  • By the host section select Segment in the path and enter 1 as the segment number image

  • Click the review button image image

  • Click submit button

  • On the homepage click search & reporting image

  • In the search bar type index=main this search term specifies the index. An index is a repository for data. Here, the index is a single dataset containing events from an index named main. image

  • Click the range dropdown menu and select All time image

  • Click the search button or press enter. Note that the search button is represented by the magnifying glass icon. Your search should retrieve thousands of events.

  • Evaluate the fields. For each event the fields are host, source, and sourcetype. Under SELECTED FIELDS, examine the same fields. image

    • Examine the field values by clicking on the field under SELECTED FIELDS. You should observe the following:
      • host: The host field specifies the name of the network host from which the event originated. In this search there are five hosts: image

      • source: The source field indicates the file name from which the event originates. You should identify eight sources. Notice /mailsv/secure.log which is a log file that contains information related to authentication and authorization attempts on the mail server.

        image

      • sourcetype: The sourcetype determines how data is formatted. You should observe three sourcetypes. Examine secure-2. image

  • Narrow search by clicking host and click mailsv image

  • Continue to narrow the search to locate any failed SSH logins for the root account. In the search bar enter index=main host=mailsv fail* root. This search expands on the search from the previous task and searches for the keyword fail*. The wildcard tells Splunk to expand the search term to find other terms that contain the word fail such as failure, failed, etc. Lastly, the keyword root searches for any event that contains the term root. Press Enter. image

  • Result image

  • There are a total of 109,864 events

  • There are 346 failed ssh logins for the root account on the mail server

5. Analysis and Reflection

  • Learnings: Querying in splunk

6. Conclusion

  • Summary: Successfully determined the failed ssh logins on the mail server's root account

7. References

google-cybersecurity-querying-splunk's People

Contributors

abelmorad avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.