SlideShare una empresa de Scribd logo
1 de 124
Descargar para leer sin conexión
Threat	Hunting	with	Splunk
Presenter:		Ken	Westin	M.Sc,	OSCP,	ITPM
Splunk,	Security	Market	Specialist
Prework for	today
● Setup	Splunk Enterprise	Security	Sandbox
● Install	free	Splunk on	laptop
● Install	ML	Toolkit	app
https://splunkbase.splunk.com/app/2890/
3
> Ken	Westin	kwestin@splunk.com @kwestin
• 1	year	at	Splunk	– Security	Specialist
• Based	in	Portland,	Oregon
• 17	years	in	technology	and	security
• M.Sc,	OSCP,	ITPM
• Trained	in	offensive	&	defensive	security
• Put	bad	guys	in	jail…with	data
$whoami
Agenda
• Threat	Hunting	Basics
• Threat	Hunting	Data	Sources
• Sysmon Endpoint	Data
• Cyber	Kill	Chain	
• Walkthrough	of	Attack	Scenario	Using	Core	Splunk (hands	on)
• Advanced	Threat	Hunting	Techniques	(Depending	on	Time)
• Enterprise	Security	Walkthrough
• Applying	Machine	Learning	and	Data	Science	to	Security
Log	In	Credentials
January,	February	&	March	 https://od-threathunting-01.splunkoxygen.com
April,	May	&	June https://od-threathunting-02.splunkoxygen.com
July and August https://od-threathunting-03.splunkoxygen.com
September	and	October https://od-threathunting-04.splunkoxygen.com
November	and	December https://od-threathunting-05.splunkoxygen.com
User:	hunter
Pass:	pr3dator
Birth	Month
These	won’t	work…
Am	I	in	the	right	place?
Some	familiarity	with…
● CSIRT/SOC	Operations
● General	understanding	of	Threat	Intelligence
● General	understanding	of	DNS,	Proxy,	and	Endpoint	types	of	data
7
This	is	a	hands-on	session.
The	overview	slides	are	important	for	building	your	
“hunt”	methodology
10	minutes	- Seriously.
What	is	threat	hunting,	why	do	you	need	it?
The	What?
• Threat	hunting	- the	
act	of	aggressively	
intercepting,	
tracking	and	
eliminating	cyber	
adversaries	as	early	
as	possible in	the	
Cyber	Kill	Chain 2
9
The	Why?
• Threats	are	human.	
Focused	and	funded	
adversaries	will	not	be	
countered	by	security	
boxes	on	the	network	
alone.	Threat	hunters	are	
actively	searching	for	
threats	to	prevent	or	
minimize	damage	[before	
it	happens] 1
2 Cyber	Threat	Hunting	- Samuel	Alonso	blog,	Jan		2016	1 The	Who,	What,	Where,	When,	Why	and	How	of	 Effective	Threat	Hunting,		SANS	Feb	2016
“Threat	Hunting	is	not	new,	it’s	
just	evolving!”
Threat	Hunting	with	Splunk
11
Vs.
Search	&	
Visualisation
Enrichment
Data
Automation
12
Human	
Threat	Hunter
Key	Building	Blocks	to	Drive	Threat	Hunting	Maturity
Ref:	The	he	Who,	What,	Where,	When,	Why	and	How	of	 Effective	Threat	Hunting,		SANS	Feb	2016
Objectives	> Hypotheses	> Expertise
“A	good	intelligence	officer	cultivates	an	
awareness	of	what	he	or	she	does	not	know.	You	
need	a	dose	of	modesty	to	acknowledge	your	own	
ignorance	- even	more,	to	seek	out	your	ignorance.	
Then	the	harder	part	comes,	trying	to	do	
something	about	it.	This	often	requires	an	
immodest	determination”
Henry	A.	Crumpton
The	Art	of	Intelligence:	Lessons	From	A	life	In	the	CIA’s	Clandestine	Service
13
SANS	Threat	Hunting	Maturity
14
Ad	Hoc	
Search
Statistical	
Analysis
Visualization
Techniques
Aggregation Machine	Learning/
Data	Science
85%																											55%																						50%																				48%																											32%	
Source:	SANS	IR	&	Threat	Hunting	Summit	2016
Search	&	
Visualisation
Enrichment
Data
Automation
Human	
Threat	Hunter
How	Splunk	helps	You	Drive	Threat	Hunting	Maturity
Threat	Hunting	Automation
Integrated	&	out	of	the	box	automation	tooling	from	artifact	
query,	contextual	“swim-lane	analysis”,	anomaly	&	time	series	
analysis	to	advanced	data	science	leveraging	machine	learning
Threat	Hunting	Data	Enrichment
Enrich	data	with	context	and	threat-intel	across	the	stack	or	time	
to	discern	deeper	patterns	or	relationships
Search	&	Visualise	Relationships	for	Faster	Hunting	
Search	and	correlate	data	while	visually	fusing	results	for	faster	
context,	analysis	and	insight
Ingest	&	Onboard	Any	Threat	Hunting	Machine	Data	Source	
Enable	fast	ingestion	of	any	machine	data	through	efficient	
indexing,	a	big	data	real	time	architecture	and	‘schema	on	the	
read’	technology
Hypotheses
Automated	
Analytics	
Data	Science	&	
Machine	
Learning
Data	&	
Intelligence	
Enrichment
Data	Search
Visualisation
Maturity
Hunting	Tools:	Internal	Data	
16
• IP	Addresses:	threat	intelligence,	blacklist,	whitelist,	reputation	monitoring
Tools:	Firewalls,	proxies,	Splunk Stream,	Bro,	IDS
• Network	Artifacts	and	Patterns:	network	flow,	packet	capture,	active	network	connections,	historic	network	connections,	ports	
and	services
Tools:	Splunk Stream,	Bro	IDS,	FPC,	Netflow
• DNS:	activity,	queries	and	responses,	zone	transfer	activity
Tools:	Splunk Stream,	Bro	IDS,	OpenDNS
• Endpoint	– Host	Artifacts	and	Patterns:	users,	processes,	services,	drivers,	files,	registry,	hardware,	memory,	disk	activity,	file	
monitoring:	hash	values,	integrity	checking	and	alerts,	creation	or	deletion
Tools:	Windows/Linux,	Carbon	Black,	Tanium,	Tripwire,	Active	Directory
• Vulnerability	Management	Data
Tools:	Tripwire	IP360,	Qualys,	Nessus	
• User	Behavior	Analytics:	TTPs,	user	monitoring,	time	of	day	location,	HR	watchlist
Splunk UBA,	(All	of	the	above)
Persist,	Repeat
Threat	Intelligence
Access/Identity
Endpoint
Network
Attacker,	know	relay/C2	sites,	infected	sites,	IOC,	
attack/campaign	intent	and	attribution
Where	they	went	to,	who	talked	to	whom,	attack	
transmitted,	abnormal	traffic,	malware	download
What	process	is	running	(malicious,	abnormal,	etc.)	
Process	owner,	registry	mods,	attack/malware	
artifacts,	patching	level,	attack	susceptibility
Access	level,	privileged	users,	likelihood	of	infection,	
where	they	might	be	in	kill	chain	
• Third-party	threat	intel
• Open-source	blacklist
• Internal	threat	intelligence
• Firewall,	IDS,	IPS
• DNS
• Email
• Endpoint	(AV/IPS/FW)
• Malware	detection
• PCLM
• DHCP
• OS	logs
• Patching
• Active	Directory
• LDAP
• CMDB
• Operating	system
• Database
• VPN,	AAA,	SSO
Typical	Data	Sources
• Web	proxy
• NetFlow
• Network
Endpoint:	Microsoft	Sysmon	Primer
18
● TA	Available	on	the	App	Store
● Great	Blog	Post	to	get	you	started
● Increases	the	fidelity	of	Microsoft	
Logging	
Blog	Post:
http://blogs.splunk.com/2014/11/24/monitoring-network-traffic-with-sysmon-and-splunk/
User:	hunter
Pass:	pr3dator
January,	February	&	March	 https://od-threathunting-01.splunkoxygen.com
April,	May	&	June https://od-threathunting-02.splunkoxygen.com
July and August https://od-threathunting-03.splunkoxygen.com
September	and	October https://od-threathunting-04.splunkoxygen.com
November	and	December https://od-threathunting-05.splunkoxygen.com
Sysmon	Event	Tags
20
Maps	Network	Comm	to	process_id
Process_id	creation	and	mapping	to	parentprocess_id
sourcetype=X*	|	search	tag=communicate
21
sourcetype=X*	|	dedup	tag|	search	tag=process
22
Data	Source	Mapping
Demo	Story	- Kill	Chain	Framework
Successful	brute	force	
– download	sensitive	
pdf	document
Weaponize	the	pdf	file	
with	Zeus	Malware
Convincing	email	
sent	with	
weaponized	pdf
Vulnerable	pdf	reader	
exploited	by	malware.		
Dropper	created	on	machine
Dropper	retrieves	
and	installs	the	
malware
Persistence	via	regular	
outbound	comm
Data	Exfiltration
Source:		Lockheed	Martin
Servers
Storage
DesktopsEmail Web
Transaction
Records
Network
Flows
DHCP/	DNS
Hypervisor
Custom	
Apps
Physical
Access
Badges
Threat	
Intelligence
Mobile
CMDB
Intrusion	
Detection
Firewall
Data	Loss	
Prevention
Anti-
Malware
Vulnerability
Scans
Traditional
Authentication
Stream	Investigations	– choose	your	data	wisely
25
26
Let’s	dig	in!
Please,	raise	that	hand	if	you	need	us	to	hit	the	pause	button
APT	Transaction	Flow	Across	Data	Sources
27
http	(proxy)	session	
to
command	&	control
server	
Remote	control
Steal	data
Persist	in	company
Rent	as	botnet
Proxy
Conduct
Business
Create	additional	
environment
Gain	Access	
to	systemTransaction
Threat	
Intelligence
Endpoint
Network
Email,	Proxy,	
DNS,	and	Web
Data	Sources
.pdf
.pdf executes	&	unpacks	malware
overwriting	and	running	“allowed”	programs
Svchost.exe
(malware)
Calc.exe
(dropper)
Attacker	hacks	website
Steals	.pdf files
Web
Portal.pdf
Attacker	creates
malware,	embed in	.pdf,	
emails	
to	the	target
MAIL
Read	email,	open	attachment
Our	Investigation	begins	by	
detecting	high	risk	
communications	through	the	
proxy,	at	the	endpoint,	and	
even	a	DNS	call.
index=zeus_demo3
28
in	search:
To	begin	our	
investigation,	we	will	
start	with	a	quick	search	
to	familiarize	ourselves	
with	the	data	sources.
In	this	demo	
environment,	we	have	a	
variety	of	security	
relevant	data	including…
Web
DNS
Proxy
Firewall
Endpoint
Email
Take	a	look	at	the	
endpoint	data	source.		
We	are	using	the	
Microsoft	Sysmon TA.
We	have	endpoint	
visibility	into	all	network	
communication	and	can	
map	each	connection	
back	to	a	process.
}
We	also	have	detailed	
info	on	each	process	and	
can	map	it	back	to	the	
user	and	parent	process.}
Lets	get	our	day	started	by	looking	
using	threat	intel to	prioritize	our	
efforts	and	focus	on	communication	
with	known high	risk	entities.
We	have	multiple	source	
IPs	communicating	to	
high	risk	entities	
identified	by	these	2	
threat	sources.
We	are	seeing	high	risk	
communication	from	
multiple	data	sources.
We	see	multiple	threat	intel related	
events	across	multiple	source	types	
associated	with	the	IP	Address	of	
Chris	Gilbert.		Let’s	take	closer	look	
at	the	IP	Address.
We	can	now	see	the	owner	of	the	system	
(Chris	Gilbert)	and	that	it	isn’t	a	PII	or	PCI	
related	asset,	so	there	are	no	immediate	
business	implications	that	would	require	
informing	agencies	or	external	customers	
within	a	certain	timeframe.	
This	dashboard	is	based	on	event	
data	that	contains	a	threat	intel
based	indicator	match(	IP	Address,	
domain,	etc.).			The	data	is	further	
enriched	with	CMDB	based	
Asset/identity	information.
We	are	now	looking	at	only	threat	
intel related	activity	for	the	IP	
Address	associated	with	Chris	
Gilbert	and	see	activity	spanning	
endpoint,	proxy,	and	DNS	data	
sources.
These	trend	lines	tell	a	very	
interesting	visual	story.		It	appears	
that	the	asset	makes	a	DNS	query	
involving	a	threat	intel related	
domain	or	IP	Address.		
Scroll	Down
Scroll	down	the	dashboard	to	
examine	these	threat	intel events	
associated	with	the	IP	Address.
We	then	see	threat	intel related	
endpoint	and	proxy	events	
occurring	periodically	and	likely	
communicating	with	a	known	Zeus	
botnet	based	on	the	threat	intel
source	(zeus_c2s).
It’s	worth	mentioning	that	at	this	point	
you	could	create	a	ticket	to	have	
someone	re-image	the	machine	to	
prevent	further	damage	as	we	continue	
our	investigation	within	Splunk.	
Within	the	same	dashboard,	we	have	
access	to	very	high	fidelity	endpoint	
data	that	allows	an	analyst	to	continue	
the	investigation	in	a	very	efficient	
manner.		It	is	important	to	note	that	
near	real-time	access	to	this	type	of	
endpoint	data	is	not	not	common	within	
the	traditional	SOC.			
The	initial	goal	of	the	investigation	is	
to	determine	whether	this	
communication	is	malicious	or	a	
potential	false	positive.		Expand	the	
endpoint	event	to	continue	the	
investigation.
Proxy	related	threat	intel matches	are	
important	for	helping	us	to	prioritize	our	
efforts	toward	initiating	an	
investigation.		Further	investigation	into	
the	endpoint	is	often	very	time	
consuming	and	often	involves	multiple	
internal	hand-offs	to	other	teams	or	
needing	to	access	additional	systems.
This	encrypted	proxy	traffic	is	concerning	
because	of	the	large	amount	of	data	
(~1.5MB)	being	transferred	which	is	
common	when	data	is	being	exfiltrated.
Exfiltration	of	data	is	a	serious	
concern	and	outbound	
communication	to	external	entity	
that	has	a	known	threat	intel
indicator,	especially	when	it	is	
encrypted	as	in	this	case.
Lets	continue	the	investigation.
Another	clue.		We	also	see	that	
svchost.exe should	be	located	in	a	
Windows	system	directory	but	this	is	
being	run	in	the	user	space.		Not	
good.
We	immediately	see	the	outbound	
communication	with	115.29.46.99	via	
https	is	associated	with	the	svchost.exe
process	on	the	windows	endpoint.		The	
process	id	is	4768.		There	is	a	great	deal	
more	information	from	the	endpoint	as	
you	scroll	down	such	as	the	user	ID	that	
started	the	process	and	the	associated	
CMDB	enrichment	information.
We	have	a	workflow	action	that	will	
link	us	to	a	Process	Explorer	
dashboard	and	populate	it	with	the	
process	id	extracted	from	the	event	
(4768).
This	is	a	standard	Windows	app,	but	
not	in	its	usual	directory,	telling	us	
that	the	malware	has	again	spoofed	
a	common	file	name.	
We	also	can	see	that	the	parent	
process	that	created	this	
suspicuous svchost.exe process	is	
called	calc.exe.	
This	has	brought	us	to	the	Process	
Explorer	dashboard	which	lets	us	
view	Windows	Sysmon endpoint	
data.
Suspected	Malware
Lets	continue	the	investigation	by	
examining	the	parent	process	as	this	
is	almost	certainly	a	genuine	threat	
and	we	are	now	working	toward	a	
root	cause.
This	is	very	consistent	with	Zeus	
behavior.	The	initial	exploitation	
generally	creates	a	downloader	or	
dropper	that	will	then	download	the	
Zeus	malware.	It	seems	like	calc.exe
may	be	that	downloader/dropper.	
Suspected	Downloader/Dropper
This	process	calls	itself	“svchost.exe,”	
a	common	Windows	process,	but	the	
path	is	not	the	normal	path	for	
svchost.exe.		
…which	is	a	common	trait	of	
malware	attempting	to	evade	
detection.	We	also	see	it	making	a	
DNS	query	(port	53)	then	
communicating	via	port	443.
The	Parent	Process	of	our	suspected	
downloader/dropper	is	the	legitimate	PDF	
Reader	program.		This	will	likely	turn	out	to	
be	the	vulnerable	app	that	was	exploited	
in	this	attack.		
Suspected	Downloader/Dropper
Suspected	Vulnerable	AppWe	have	very	quickly	moved	from	
threat	intel related	network	and	
endpoint	activity	to	the	likely	
exploitation	of	a	vulnerable	app.		
Click	on	the	parent	process	to	keep	
investigating.
We	can	see	that	the	PDF	
Reader	process	has	no	
identified	parent	and	is	the	
root	of	the	infection.	
Scroll	Down
Scroll	down	the	dashboard	to	
examine	activity	related	to	the	PDF	
reader	process.
Chris	opened	2nd_qtr_2014_report.pdf	
which	was	an	attachment	to	an	email!
We	have	our	root	cause!		Chris	opened	a	
weaponized .pdf file	which	contained	the	Zeus	
malware.		It	appears	to	have	been	delivered	via	
email	and	we	have	access	to	our	email	logs	as	one	
of	our	important	data	sources.		Lets	copy	the	
filename	2nd_qtr_2014_report.pdf	and	search	a	
bit	further	to	determine	the	scope	of	this	
compromise.
Lets	dig	a	little	further	into	
2nd_qtr_2014_report.pdf	to	determine	the	scope	
of	this	compromise.
index=zeus_demo3	2nd_qtr_2014_report.pdf
41
in	search:
Lets	search	though	multiple	data	sources	to	
quickly	get	a	sense	for	who	else	may	have	
have	been	exposed	to	this	file.	
We	will	come	back	to	the	web	
activity	that	contains	reference	to	
the	pdf file	but	lets	first	look	at	the	
email	event	to	determine	the	scope	
of	this	apparent	phishing	attack.
We	have	access	to	the	email	
body	and	can	see	why	this	was	
such	a	convincing	attack.		The	
sender	apparently	had	access	to	
sensitive	insider	knowledge	and	
hinted	at	quarterly	results.
There	is	our	attachment.
Hold	On!		That’s	not	our	
Domain	Name!		The	spelling	is	
close	but	it’s	missing	a	“t”.		The	
attacker	likely	registered	a	
domain	name	that	is	very	close	
to	the	company	domain	hoping	
Chris	would	not	notice.	
This	looks	to	be	a	very	
targeted	spear	phishing	
attack	as	it	was	sent	to	
only	one	employee	(Chris).
Root	Cause	Recap
44
Data	Sources
.pdf executes	&	unpacks	malware
overwriting	and	running	“allowed”	programs
http	(proxy)	session	
to
command	&	control
server	
Remote	control
Steal	data
Persist	in	company
Rent	as	botnet
Proxy
Conduct
Business
Create	additional	
environment
Gain	Access	
to	systemTransaction
Threat	
Intelligence
Endpoint
Network
Email,	Proxy,	
DNS,	and	Web
.pdf
Svchost.exe
(malware)
Calc.exe
(dropper)
Attacker	hacks	website
Steals	.pdf files
Web
Portal.pdf
Attacker	creates
malware,	embed in	.pdf,	
emails	
to	the	target
MAIL
Read	email,	open	attachment
We	utilized	threat	intel to	detect	
communication	with	known	high	risk	
indicators	and	kick	off	our	investigation	
then	worked	backward	through	the	kill	
chain	toward	a	root	cause.
Key	to	this	investigative	process	is	the	
ability	to	associate	network	
communications	with	endpoint	process	
data.
This	high	value	and	very	relevant	ability	to	
work	a	malware	related	investigation	
through	to	root	cause	translates	into	a	very	
streamlined	investigative	process	compared	
to	the	legacy	SIEM	based	approach.
45
Lets	revisit	the	search	for	additional	
information	on	the	2nd_qtr_2014-
_report.pdf	file.		
We	understand	that	the	file	was	delivered	
via	email	and	opened	at	the	endpoint.	Why	
do	we	see	a	reference	to	the	file	in	the	
access_combined (web	server)	logs?	
Select	the	access_combined
sourcetype to	investigate	
further.
46
The	results	show	54.211.114.134	has	
accessed	this	file	from	the	web	portal	
of	buttergames.com.		
There	is	also	a	known	threat	intel
association	with	the	source	IP	
Address	downloading	(HTTP	GET)	
the	file.
47
Select	the	IP	Address,	left-click,	then	
select	“New	search”.		We	would	like	to	
understand	what	else	this	IP	Address	
has	accessed	in	the	environment.
48
That’s	an	abnormally	large	
number	of	requests	sourced	
from	a	single	IP	Address	in	a	
~90	minute	window.
This	looks	like	a	scripted	
action	given	the	constant	
high	rate	of	requests	over	
the	below	window.		
Scroll	Down
Scroll	down	the	dashboard	to	
examine	other	interesting	fields	to	
further	investigate.	
Notice	the	Googlebot
useragent string which	is	
another	attempt	to	avoid	
raising	attention..
49
The	requests	from	52.211.114.134	are	
dominated	by	requests	to	the	login	page	
(wp-login.php).		It’s	clearly	not	possible	to	
attempt	a	login	this	many	times	in	a	short	
period	of	time	– this	is	clearly	a	scripted	
brute	force	attack.
After	successfully	gaining	access	to	our	
website,	the	attacker	downloaded	the	
pdf file,	weaponized it	with	the	zeus
malware,	then	delivered	it	to	Chris	
Gilbert	as	a	phishing	email.		
The	attacker	is	also	accessing	admin	
pages	which	may	be	an	attempt	to	
establish	persistence	via	a	backdoor	into	
the	web	site.
Kill	Chain	Analysis	Across	Data	Sources
50
http	(proxy)	session	
to
command	&	control
server	
Remote	control
Steal	data
Persist	in	company
Rent	as	botnet
Proxy
Conduct
Business
Create	additional	
environment
Gain	Access	
to	systemTransaction
Threat	
Intelligence
Endpoint
Network
Email,	Proxy,	
DNS,	and	Web
Data	Sources
.pdf
.pdf executes	&	unpacks	malware
overwriting	and	running	“allowed”	programs
Svchost.exe
(malware)
Calc.exe
(dropper)
Attacker	hacks	website
Steals	.pdf files
Web
Portal.pdf
Attacker	creates
malware,	embed in	.pdf,	
emails	
to	the	target
MAIL
Read	email,	open	attachment
We	continued	the	investigation	
by	pivoting	into	the	endpoint	
data	source	and	used	a	
workflow	action	to	determine	
which	process	on	the	endpoint	
was	responsible	for	the	
outbound	communication.
We	Began	by	reviewing	
threat	intel related	events	
for	a	particular	IP	address	
and	observed	DNS,	Proxy,	
and	Endpoint	events	for	a	
user	in	Sales.
Investigation	complete!		Lets	get	this	
turned	over	to	Incident	Reponse team.
We	traced	the	svchost.exe
Zeus	malware	back	to	it’s	
parent	process	ID	which	was	
the	calc.exe
downloader/dropper.
Once	our	root	cause	analysis	
was	complete,	we	shifted	out	
focus	into	the	web	logs	to	
determine	that	the	sensitive	pdf
file	was	obtained	via	a	brute	
force	attack	against	the	
company	website.
We	were	able	to	see	which	
file	was	opened	by	the	
vulnerable	app	and	
determined	that	the	
malicious	file	was	delivered	
to	the	user	via	email.
A	quick	search	into	the	mail	
logs	revealed	the	details	
behind	the	phishing	attack	
and	revealed	that	the	scope	
of	the	compromise	was	
limited	to	just	the	one	user.
We	traced	calc.exe back	to	
the	vulnerable	application	
PDF	Reader.
10	min	Break!
Appendix
- SQLi
- Lateral	Movement
-DNS	Exfilatration
SQLi
SQL	Injection
● SQL	injection
● Code	injection
● OS	commanding
● LDAP	injection
● XML	injection
● XPath	injection
● SSI	injection
● IMAP/SMTP	injection
● Buffer	overflow
Imperva	Web	Attacks	Report,	2015
The	anatomy	of	a	SQL	injection	attack
SELECT * FROM users WHERE email='xxx@xxx.com'
OR 1 = 1 -- ' AND password='xxx';
xxx@xxx.xxx' OR 1 = 1 -- '
xxx
admin@admin.sys
1234
An	attacker	might	supply:
…and	so	far	this	year…	39
index=web_vuln password	select
What	have	we	here?
Our	learning	environment	consists	of:
• A	bunch	of	publically-accessible	single	
Splunk servers
• Each	with	~5.5M	events,	from	real	
environments	but	massaged:
• Windows	Security	events
• Apache	web	access	logs
• Bro	DNS	&	HTTP
• Palo	Alto	traffic	logs
• Some	other	various	bits
https://splunkbase.splunk.com/app/1528/
Search	for	possible	SQL	injection	in	your	events:
ü looks	for	patterns	in	URI	query	field	to	see	if	
anyone	has	injected	them	with	SQL	
statements
ü use	standard	deviations	that	are	2.5	times	
greater	than	the	average	length	of	your	URI	
query	field
Macros	used
• sqlinjection_pattern(sourcetype,	uri query	field)
• sqlinjection_stats(sourcetype,	uri query	field)
Regular	Expression	FTW
sqlinjection_rex is	a	search	macro.	It	contains:
(?<injection>(?i)select.*?from|union.*?select|'$|delete.*?from|update.*?set|alter.*?table|([
%27|'](%20)*=(%20)*[%27|'])|w*[%27|']or)
Which	means:	In	the	string	we	are	given,	look	for	ANY of	the	following	matches	and	put	that	
into	the	“injection”	field.	
• Anything	containing	SELECT	followed	by	FROM
• Anything	containing	UNION	followed	by	SELECT
• Anything	with	a	‘	at	the	end
• Anything	containing	DELETE	followed	by	FROM
• Anything	containing	UPDATE	followed	by	SET
• Anything	containing	ALTER	followed	by	TABLE
• A	%27	OR	a	‘	and	then	a	%20	and	any	amount	of	characters	then	a	%20	and	then	a	%27	OR	a	‘
• Note:	%27	is	encoded	“’”	and	%20	is	encoded	<space>
• Any	amount	of	word	characters	followed	by	a	%27	OR	a	‘	and	then	“or”
Bonus:	Try	out	the	SQL	Injection	app!
Summary:	Web	attacks/SQL	injection
● SQL	injection	provide	attackers	with	easy	access	to	data
● Detecting	advanced	SQL	injection	is	hard	– use	an	app!
● Understand	where	SQLi is	happening	on	your	network	and	put	a	
stop	to	it.
● Augment	your	WAF	with	enterprise-wide	Splunk searches.
Lateral	Movement
Poking	around
An	attacker	hacks	a	non-privileged	user	system.	
So	what?
Lateral	Movement
Lateral	Movement	is	the	expansion	of	systems	
controlled,	and	data	accessed.
Most	famous	Lateral	Movement	attack?
(excluding	password	re-use)
Pass	the	Hash!
Detecting	Legacy	PtH
Look	for	Windows	Events:
● Event	ID:	4624	or	4625
● Logon	type:	3
● Auth package:	NTLM
● User	account	is	not	a	domain	logon,	or	Anonymous	
Logon
LM	Detection:	Pass	the	Hash
source=WinEventLog:Security
EventCode=4624		
Authentication_Package=NTLM	
Type=Information
Then	it	got	harder
• Pass	the	Hash	tools	have	improved	
• Tracking	of	jitter,	other	metrics
• So	let’s	detect	lateral	movement	
differently
Network	traffic	provides	source	of	truth
● I	usually	talk	to	10	hosts
● Then	one	day	I	talk	to	10,000	hosts
● ALARM!
LM	Detection:	Network	Destinations
sourcetype="pan:traffic"	
|	stats	count	dc(dest)	sparkline(dc(dest))	by	
src_ip
Consistently	large
Inconsistent!
LM	Detection:	Network	Destinations
sourcetype="pan:traffic"	
|	bucket	_time	span=1d	
|	stats	count	dc(dest)	as	NumDests by	src_ip _time	
|	stats	avg(NumDests)	as	avg stdev(NumDests)	as	
stdev latest(NumDests)	as	latest	by	src_ip
|	where	latest	>	2	*	stdev +	avg
Find	daily	average,	standard	deviation,	and	most	recent
Splunk UBA
Summary:	Lateral	Movement
● Attacker	success	defines	scope	of	a	breach
● High	difficulty,	high	importance
● Worth	doing	in	Splunk
● Easy	with	UBA
DNS	Exfiltration
domain=corp;user=dave;password=12345
encrypt
DNS	Query:
ZG9tYWluPWNvcnA7dXNlcj1kYXZlO3Bhc3N3b3JkPTEyMzQ1DQoNCg==.attack.com
ZG9tYWluPWNvcnA7dXNlcj1kYXZlO3Bhc3N3b3JkPTEyMzQ1DQoNCg==
DNS	exfil tends	to	be	
overlooked	within	an	
ocean	of	DNS	data.
Let’s	fix	that!
DNS	exfiltration
FrameworkPOS:	a	card-stealing	program	that	exfiltrates data	from	the	
target’s	network	by	transmitting	it	as	domain	name	system	(DNS)	traffic
But	the	big	difference	is	the	way	how	stolen	data	is	
exfiltrated:	the	malware	used	DNS	requests!	
https://blog.gdatasoftware.com/2014/10/23942-new-frameworkpos-
variant-exfiltrates-data-via-dns-requests
“
”
…	few	organizations	actually	keep	detailed	logs	or	records	
of the	DNS	traffic	traversing	their	networks	— making	it	an	
ideal	way	to	siphon	data	from	a	hacked	network.		
http://krebsonsecurity.com/2015/05/deconstructing-the-2014-sally-
beauty-breach/#more-30872
“
”
DNS	exfiltration
https://splunkbase.splunk.com/app/2734/
DNS	exfil detection	– tricks	of	the	trade
ü parse	URLs	&	complicated	TLDs	(Top	Level	Domain)
ü calculate	Shannon	Entropy
List	of	provided	lookups
• ut_parse_simple(url)
• ut_parse(url,	list)	or	ut_parse_extended(url,	list)	
• ut_shannon(word)
• ut_countset(word,	set)
• ut_suites(word,	sets)
• ut_meaning(word)
• ut_bayesian(word)
• ut_levenshtein(word1,	word2)
Examples
• The	domain	aaaaa.com has	a	Shannon	Entropy	score	of	1.8 (very	low)
• The	domain	google.com has	a	Shannon	Entropy	score	of	2.6 (rather	low)
• A00wlkj—(-a.aslkn-C.a.2.sk.esasdfasf1111)-890209uC.4.com has	a	Shannon	
Entropy	score	of	3 (rather	high)
Layman’s	definition:	a	score	reflecting	the	randomness or	measure	of	
uncertainty of	a	string
Shannon	Entropy
Detecting	Data	Exfiltration
index=bro	sourcetype=bro_dns
|	`ut_parse(query)`	
|	`ut_shannon(ut_subdomain)`	
|	eval sublen =	
length(ut_subdomain)	
|	table	ut_domain ut_subdomain
ut_shannon sublen
TIPS
q Leverage	our	Bro	DNS	data
q Calculate	Shannon	Entropy	scores
q Calculate	subdomain	length
q Display	Details
Let’s	get	hands	on!
DNS	Exfiltration
Detecting	Data	Exfiltration
…	|	stats	
count	
avg(ut_shannon)	as	avg_sha
avg(sublen)	as	avg_sublen
stdev(sublen)	as	stdev_sublen
by	ut_domain
|	search	avg_sha>3	avg_sublen>20	
stdev_sublen<2
TIPS
q Leverage	our	Bro	DNS	data
q Calculate	Shannon	Entropy	scores
q Calculate	subdomain	length
q Display	count,	scores,	lengths,	
deviations
Detecting	Data	Exfiltration
RESULTS
• Exfiltrating data	requires	many	DNS	requests	– look	for	high	counts
• DNS	exfiltration	to	mooo.com and chickenkiller.com
Summary:	DNS	exfiltration
● Exfiltration	by	DNS	and	ICMP	is	a	very	common	technique
● Many	organizations	do	not	analyze	DNS	activity	– do	not	be	like	them!
● No	DNS	logs?	No	Splunk	Stream?	Look	at	FW	byte	counts
http://www.slideshare.net/kwestin/w
orkshop-threathunting
Splunk Enterprise	
Security
93
Splunk	Enterprise
- Big	Data	Analytics	Platform	-
Splunk	Enterprise	Security	
- Security	Analytics	Platform	-
Threat	Hunting	with	Splunk	
Hypotheses
Automated	
Analytics	
Data	Science	&	
Machine	
Learning
Data	&	
Intelligence	
Enrichment
Data	Search
Visualisation
Maturity	
Threat	Hunting	Data	
Enrichment
Threat	Hunting	
Automation
Ingest	&	Onboard	Any	
Threat	Hunting	
Machine	Data	Source	
Search	&	Visualise	
Relationships	for	
Faster	Hunting
Other	Items	To	Note
Items	to	Note
Navigation	- How	to	Get	Here
Description	of	what	to	click	on
Click
Key	Security	Indicators	(build	your	own!)
Sparklines
Editable
Various	ways	to	filter	data
Malware-Specific	KSIs	and	Reports
Security	Domains	->	Endpoint	->	Malware	Center
Filterable
KSIs	specific	to	Risk
Risk	assigned	to	system,	
user	or	other
Under	Advanced	Threat,	
select	Risk	Analysis
(Scroll	Down)
Recent	Risk	Activity
Under	Advanced	Threat,	
select	Risk	Analysis
Filterable,	down	to	IoC
KSIs	specific	to	Threat
Most	active	threat	source
Scroll	down…
Scroll
Under	Advanced	Threat,	
select	Threat	Activity
Specifics	about	recent	threat	matches
Under	Advanced	Threat,	
select	Threat	Activity
To	add	threat	intel	go	to:
Configure	->	Data	Enrichment	->	
Threat	Intelligence	Downloads
Click
Click	“Threat	Artifacts”
Under	“Advanced	Threat”
Click
Artifact	Categories	–
click	different	tabs…
STIX	feed
Custom	feed
Under	Advanced	Threat,	
select	Threat	Artifacts
Review	the	Advanced	Threat	
content
Click
Data	from	asset	framework
Configurable	Swimlanes
Darker=more	events
All	happened	around	same	timeChange	to	
“Today”	if	needed
Asset	Investigator,	enter	
“192.168.56.102”
Data	Science	&	
Machine	Learning	In	
Security
106
Disclaimer:	I	am	not	a	data	scientist
Types	of	Machine	Learning
Supervised Learning:		generalizing	from	labeled data
Supervised Machine	Learning
109
Domain	Name TotalCnt RiskFactor AGD SessionTime RefEntropy NullUa Outcome
yyfaimjmocdu.com 144 6.05 1 1 0 0 Malicious
jjeyd2u37an30.com 6192 5.05 0 1 0 0 Malicious
cdn4s.steelhousemedia.com 107 3 0 0 0 0 Benign
log.tagcade.com 111 2 0 1 0 0 Benign
go.vidprocess.com 170 2 0 0 0 0 Benign
statse.webtrendslive.com 310 2 0 1 0 0 Benign
cdn4s.steelhousemedia.com 107 1 0 0 0 0 Benign
log.tagcade.com 111 1 0 1 0 0 Benign
Unsupervised Learning:		generalizing	from	unlabeled data
Unsupervised Machine	Learning
• No	tuning
• Programmatically	finds	trends
• UBA	is	primarily	unsupervised
• Rigorously	tested	for	fit
111
AlgorithmRaw	Security	Data Automated	Clustering
112
ML	Toolkit	&	Showcase
• Splunk	Supported	framework	for	building	ML	Apps
– Get	it	for	free:	http://tiny.cc/splunkmlapp
• Leverages	Python	for	Scientific	Computing (PSC)	add-on:
– Open-source	Python	data	science	ecosystem
– NumPy,	SciPy,	scitkit-learn,	pandas,	statsmodels
• Showcase	use	cases:	Predict	Hard	Drive	Failure,	Server	Power	
Consumption,	Application	Usage,	Customer	Churn	&	more
• Standard	algorithms out	of	the	box:
– Supervised:	Logistic	Regression,	SVM,	Linear	Regression,	Random	Forest,	etc.
– Unsupervised: KMeans,	DBSCAN,	Spectral	Clustering,	PCA,	KernelPCA,	etc.
• Implement	one	of	300+	algorithms	by	editing	Python	scripts
Machine	Learning	
Toolkit	Demo
114
Splunk UBA
117
Splunk	Enterprise
- Big	Data	Analytics	Platform	-
Splunk	Enterprise	Security	
- Security	Analytics	Platform	-
Threat	Hunting	with	Splunk	
Threat	Hunting	Data	
Enrichment
Threat	Hunting	
Automation
Ingest	&	Onboard	Any	
Threat	Hunting	
Machine	Data	Source	
Search	&	Visualise	
Relationships	for	
Faster	Hunting	
Hypotheses
Automated	
Analytics	
Data	Science	&	
Machine	
Learning
Data	&	
Intelligence	
Enrichment
Data	Search
Visualisation
Maturity	
User	Behavior	Analytics
- Security	Data	Science	Platform	-
118
Machine	Learning	Security	Use	Cases
Machine	Learning	Use	Cases
Polymorphic	Attack	Analysis
Behavioral	Peer	Group	Analysis
User	&	Entity	Behavior	Baseline
Entropy/Rare	Event	Detection
Cyber	Attack	/	External	Threat	Detection
Reconnaissance,	Botnet	and	C&C	Analysis
Lateral	Movement	Analysis
Statistical	Analysis
Data	Exfiltration	Models
IP	Reputation	Analysis
Insider	Threat	Detection
User/Device	Dynamic	Fingerprinting
Splunk UBA	Use	Cases
ACCOUNT	TAKEOVER
• Privileged	account	compromise
• Data	exfiltration
LATERAL	MOVEMENT
• Pass-the-hash	kill	chain
• Privilege	escalation
SUSPICIOUS	ACTIVITY
• Misuse	of	credentials
• Geo-location	anomalies
MALWARE	ATTACKS
• Hidden	malware	activity
BOTNET,	COMMAND	&	CONTROL
• Malware	beaconing
• Data	leakage
USER	&	ENTITY	BEHAVIOR	ANALYTICS
• Suspicious	behavior	by	accounts	or	
devices
EXTERNAL	THREATSINSIDER	THREATS
Splunk	User	Behavior	Analytics	(UBA)
• ~100%	of	breaches	involve	valid	credentials	(Mandiant Report)
• Need	to	understand	normal	&	anomalous	behaviors	for	ALL	users
• UBA	detects	Advanced	Cyberattacks and	Malicious	Insider	Threats
• Lots	of	ML	under	the	hood:
– Behavior	Baselining	&	Modeling
– Anomaly	Detection	(30+	models)
– Advanced	Threat	Detection
• E.g.,	Data	Exfil Threat:
– “Saw	this	strange	login	&	data	transferfor user	kwestin
at	3am	in	China…”
– Surface	threat	to	SOC	Analysts
RAW SECURITY
EVENTS
ANOMALIES ANOMALY
CHAINS
(THREATS)
MACHINE
LEARNING
GRAPH
MINING
THREAT
MODELS
Lateral Movement
Beaconing
Land-Speed Violation
HCI
Anomalies graph
Entity relationship graph
Kill chain sequence
Forensic artifacts
Threat/Risk scoring
FEEDBACK
Splunk UBA	Demo
122
Security	Workshops
● Threat	Intelligence	Workshop
● Insider	Threat
● CSC	20	Workshop
● SIEM+
● Splunk UBA	Data	Science	Workshop	
● Enterprise	Security	Benchmark	Assessment
Security	Workshop	Survey
https://www.surveymonkey.com/r/NL7RN6B
kwestin@splunk.com
Twitter:	@kwestin
linkedin.com/in/kwestin

Más contenido relacionado

La actualidad más candente

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report Morane Decriem
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshopArpan Raval
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentTeymur Kheirkhabarov
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemRoss Wolf
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheetMichael Gough
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersInfosec
 

La actualidad más candente (20)

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 

Destacado

Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk Splunk
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-huntingTripwire
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingTripwire
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Splunk
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOCSplunk
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101Splunk
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Splunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk
 
Splunk Enterprise for Information Security (Hands-On)
Splunk Enterprise for Information Security (Hands-On)                           Splunk Enterprise for Information Security (Hands-On)
Splunk Enterprise for Information Security (Hands-On) Splunk
 
SplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheapAnjum Ahuja
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0Michael Gough
 

Destacado (20)

Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-hunting
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Splunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout Session
 
Splunk Enterprise for Information Security (Hands-On)
Splunk Enterprise for Information Security (Hands-On)                           Splunk Enterprise for Information Security (Hands-On)
Splunk Enterprise for Information Security (Hands-On)
 
SplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – Virtustream
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 

Similar a Threat Hunting with Splunk

Threat Hunting workshop
Threat Hunting workshopThreat Hunting workshop
Threat Hunting workshopSplunk
 
Threat hunting workshop
Threat hunting workshopThreat hunting workshop
Threat hunting workshopMegan Shippy
 
Threat hunting workshop
Threat hunting workshopThreat hunting workshop
Threat hunting workshopSplunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
Customer Presentation, FirstSolar
Customer Presentation, FirstSolarCustomer Presentation, FirstSolar
Customer Presentation, FirstSolarSplunk
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunk
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Intro to Security Analytics MethodsSplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Intro to Security Analytics MethodsSplunk
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...Splunk
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunk
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Splunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk
 
Splunk for security
Splunk for securitySplunk for security
Splunk for securityGreg Hanchin
 
SplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
 

Similar a Threat Hunting with Splunk (20)

Threat Hunting workshop
Threat Hunting workshopThreat Hunting workshop
Threat Hunting workshop
 
Threat hunting workshop
Threat hunting workshopThreat hunting workshop
Threat hunting workshop
 
Threat hunting workshop
Threat hunting workshopThreat hunting workshop
Threat hunting workshop
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Customer Presentation, FirstSolar
Customer Presentation, FirstSolarCustomer Presentation, FirstSolar
Customer Presentation, FirstSolar
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Intro to Security Analytics MethodsSplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis Perkins
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Splunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk for Security at The Ohio State University
Splunk for Security at The Ohio State University
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
SplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics Methods
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 

Más de Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

Más de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Threat Hunting with Splunk