Cyber Incident Response with Splunk | TryHackMe Incident Handling with Splunk

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 35

  • @danishuddin9752
    @danishuddin9752 20 днів тому

    Absolutely amazing sir! Hats off! Best video to learn what incident handling actually means!

  • @tonyfernandes216
    @tonyfernandes216 Рік тому +2

    You are simply the Best.

    • @albuandrei2005
      @albuandrei2005 5 місяців тому

      I read that in Tina Turner's voice :P

  • @kazimtalibov3877
    @kazimtalibov3877 Рік тому +2

    Good day! thanks for the video! How did you upload data ?Which data? Where did you get it? thanks

  • @Gamer16232
    @Gamer16232 2 роки тому +9

    If we’re new to this how are we supposed to know acunetix is a vulnerability scanner? Remember most people here are trying to learn from scratch. I feel like this would be better if you go in with the mindset that you’re a noobie. Just my opinion

    • @CreepyGRC
      @CreepyGRC 2 роки тому +2

      Mostly you apply OSINT as you continue to learn, everything started foggy for me until I am able to piece everything together and that's the challenge. Tryhackme and other platforms provide the leverage to piece them together compared to enrolling in courses.

    •  2 роки тому +2

      I was doing this on my own when I was looking for the web host and since I wasn't sure I looked it up on Google. Whenever the information isn't handed to you you should Google it. OSINT is a big part of security operations.

    • @vz7742
      @vz7742 Рік тому +1

      Its tipical shitty THM room in which they dont explain majority of stuff. Im switchingto HTB Academy on first July.

  • @yassine1sehli
    @yassine1sehli Рік тому +1

    Thanks ! Informative content !
    Could you please share with us your notes so that we can use them during THM trainings ?

    • @MotasemHamdan
      @MotasemHamdan  Рік тому +1

      Hello, notes are part of channel membership tier 2.
      Details:
      motasem-notes.net/cyber-security-field-notes/

  • @Nasserr2
    @Nasserr2 Рік тому +1

    is there a way we can get your notes ? they seem very good. also what note app is that

    • @MotasemHamdan
      @MotasemHamdan  Рік тому

      Hello, you can subscribe to the channel membership tier 2 to get access to all the notes, link below
      ua-cam.com/channels/NSdU_1ehXtGclimTVckHmQ.htmljoin
      Or if you are interested in one subject among the others, you can pay for one time. The notes that are available for one time purchase can be found below
      motasem-notes.net/

  • @johnvardy9559
    @johnvardy9559 7 місяців тому

    32:26 you have click on event 1 why you cklicked this one and not event 7?what is the mindset we have to invest all of these events.? what did you choose this one?

  • @johnvardy9559
    @johnvardy9559 7 місяців тому

    great work!

  • @deonmarfo9878
    @deonmarfo9878 Рік тому

    Thank You! Is there any way you can share your notes ?

    • @MotasemHamdan
      @MotasemHamdan  Рік тому

      Hello, you can subscribe to the channel membership tier 2 to get access to all the notes, link below
      ua-cam.com/channels/NSdU_1ehXtGclimTVckHmQ.htmljoin
      Or if you are interested in one subject among the others, you can pay for one time. The notes that are available for one time purchase can be found below
      motasem-notes.net/

  • @Joyrolliiii
    @Joyrolliiii 11 місяців тому

    Hi, i understand IP 40.80.148.42 has more logs. so basically it could be an attacker. however, how did you find/ why could you make sure that this IP was the attacker by looking the field? I'm looking at it but don't know what is the specific things that I need to look. Thank you for your video lecture, it really helps me a lot.

  • @EmmanuelAwuzie
    @EmmanuelAwuzie Рік тому

    hello motasem i noticed you have a notes library with rich information i need those can i buy from you??

  • @muhammadrazahayder7264
    @muhammadrazahayder7264 Рік тому

    Can have your notes if you deem appropriate? Please. It seems the ultimate sheet for any analyst.

  • @wazibabor3854
    @wazibabor3854 Рік тому +1

    Hello Sir, can u trained us Cyber Incident Response with Splunk in the real world case with projects

  • @martinbaran6439
    @martinbaran6439 7 місяців тому

    You said the attackers leveraged a vulnerability to gain access to the web server but that not true, the attacker actually brute forced his way in for the initial entry

  • @kevingardocki
    @kevingardocki Рік тому

    When I put in index=botsv1 , no events are popping up , is there a step in the beginning im missing?

    • @MotasemHamdan
      @MotasemHamdan  Рік тому +1

      Did you try index=* ?

    • @kevingardocki
      @kevingardocki Рік тому

      @@MotasemHamdan yes that as well are you putting in data sets ? I tried index=“botsv1”
      I wonder if anything change with values

    • @0x360-w9h
      @0x360-w9h Рік тому

      @@kevingardocki try change smart mode to the verbose mode, and time setting from last 24hr to all time. you can find them in the right part of the page

    • @hidden9495
      @hidden9495 Рік тому

      What about time period? Might be changing it into "All time" might help.

    • @CertifiedOtherBoy-cn7pg
      @CertifiedOtherBoy-cn7pg Рік тому

      @@hidden9495 That's what it was for me. Changing to All Time did the trick.

  • @CreepyGRC
    @CreepyGRC 2 роки тому +2

    Is this the reason why organizations prefer ELK stack because splunk is harder to query? Haha. Do you know other query tools Motasem aside from Sigma, would love to hear your suggestions. :D

    • @MotasemHamdan
      @MotasemHamdan  2 роки тому +2

      Brim is a great tool to analyze network packet captures and works based on queries.

  • @liebermen2369
    @liebermen2369 5 місяців тому

    34:00 for some reason my hash value for the first log was different and the hash value of the third log turned out to be the correct answer, writing this comment here in case someone else gets this problem.