YoVDO

Weaponizing Splunk - Using Blue Teams for Evil

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Splunk Courses Data Extraction Courses Log Analysis Courses Offensive Security Courses Command and Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how Splunk, a popular log management tool, can be weaponized for malicious purposes in this eye-opening conference talk from BSidesCharm 2017. Delve into the process of reviewing logs, extracting sensitive data, and leveraging Splunk for command and control operations. Learn about advanced techniques such as swamp shells and gating actions, which can be used to exploit vulnerabilities in blue team defenses. Gain valuable insights into potential security risks and enhance your understanding of how attackers might misuse legitimate tools for nefarious activities.

Syllabus

Introduction
Reviewing the Logs
Weaponizing Splunk
Extracting Data
Swamp Shells
Command Control
Gating Actions


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube