Threat Hunting with Splunk

Demonstrate your Splunk threat hunting skills and uncover a C2 communications related incident. A security tool alerted on a suspicious file with an anomalous extension. Hunt through Splunk logs to uncover C2 communication and attacker activities....

Please don't try to bypass it

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription. This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content.

Please don't try to bypass it

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription. This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content.

This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content. You will able to see actual content after trial or subscription.This is just test sentence, not the actual lessons content.

Picture of the author

Donec et orci aliquet nisl suscipit molestie sed sit amet tortor. Duis vel urna ac mi sollicitudin lacinia mollis sit amet lorem. Sed finibus erat nec libero scelerisque fringilla. Morbi at orci sed urna vulputate vulputate. Nulla facilisi.

Donec et orci aliquet nisl suscipit molestie sed sit amet tortor. Duis vel urna ac mi sollicitudin lacinia mollis sit amet lorem. Sed finibus erat nec libero scelerisque fringilla. Morbi at orci sed urna vulputate vulputate. Nulla facilisi.

Unlock world Class Cyber Security Skills

What distribution system was used by the victim, including its version?

What is the SHA256 hash of the crack file that was downloaded?