blog

  •  Home
  •  Blog
  •  Contact
  •  
  • Search
  • Menu
  •  Home

  •  Blog

  •  Contact

  •  

Recent Posts

Leveraging osquery to examine the XProtect Behavioral Service DB

July 27, 2023

Sunsetting DetectionLab

December 31, 2022

Quick and Dirty Linux Forensics

September 27, 2021

My Take on the Decent Coffee Cart

January 2, 2021

Installing DetectionLab on ESXi

November 4, 2020

Too Big to Care

October 8, 2020

Working Through Splunk's Boss of the SOC - Part 6

July 13, 2020

Working Through Splunk's Boss of the SOC - Part 5

July 12, 2020

Working Through Splunk's Boss of the SOC - Part 4

July 7, 2020

Working Through Splunk's Boss of the SOC - Part 3

June 28, 2020

Working Through Splunk's Boss of the SOC - Part 2

June 27, 2020

Working Through Splunk's Boss of the SOC - Part 1

June 26, 2020

2019 in Review

January 3, 2020

Setting Up Wireguard VPN with Algo

March 30, 2019

Completing My Multi-Computer Desk Setup

August 13, 2018

Using Osquery to Detect Reverse Shells on MacOS

January 21, 2018

pwnable.kr: [mistake]

December 7, 2017

Working Through Splunk's Boss of the SOC - Part 6

July 13, 2020 Chris Long

10 minute read

Microsoft cloud services often have a delay or lag between “index time” and “event creation time”. For the entire day, what is the max lag, in minutes, for the sourcetype: ms:aad:signin? Answer guidance: Round to the nearest minute without the unit of measure.

  • Continue Reading
    • bots
    • splunk
    • threathunting

Working Through Splunk's Boss of the SOC - Part 5

July 12, 2020 Chris Long

12 minute read

During the attack, two files are remotely streamed to the /tmp directory of the on-premises Linux server by the adversary. What are the names of these files? Answer guidance: Comma separated without spaces, in alphabetical order, include the file extension where applicable.

  • Continue Reading
    • bots
    • splunk
    • threathunting

Working Through Splunk's Boss of the SOC - Part 4

July 7, 2020 Chris Long

9 minute read

What is the name of the user that was created after the endpoint was compromised?

  • Continue Reading
    • bots
    • splunk
    • threathunting
  • Previous Page
  • Next Page

Chris Long

Recent Posts

Leveraging osquery to examine the XProtect Behavioral Service DB

July 27, 2023

Sunsetting DetectionLab

December 31, 2022

Quick and Dirty Linux Forensics

September 27, 2021

My Take on the Decent Coffee Cart

January 2, 2021

Installing DetectionLab on ESXi

November 4, 2020

Too Big to Care

October 8, 2020

Working Through Splunk's Boss of the SOC - Part 6

July 13, 2020

Working Through Splunk's Boss of the SOC - Part 5

July 12, 2020

Working Through Splunk's Boss of the SOC - Part 4

July 7, 2020

Working Through Splunk's Boss of the SOC - Part 3

June 28, 2020

Working Through Splunk's Boss of the SOC - Part 2

June 27, 2020

Working Through Splunk's Boss of the SOC - Part 1

June 26, 2020

2019 in Review

January 3, 2020

Setting Up Wireguard VPN with Algo

March 30, 2019

Completing My Multi-Computer Desk Setup

August 13, 2018

Using Osquery to Detect Reverse Shells on MacOS

January 21, 2018

pwnable.kr: [mistake]

December 7, 2017

About

I'm the creator and maintainer of https://detectionlab.network.

Learn More

© 2023 clo.ng . Powered by Hugo