Weaponizing Splunk - Using Blue Teams for Evil
Offered By: YouTube
Course Description
Overview
Explore how Splunk, a popular log management tool, can be weaponized for malicious purposes in this eye-opening conference talk from BSidesCharm 2017. Delve into the process of reviewing logs, extracting sensitive data, and leveraging Splunk for command and control operations. Learn about advanced techniques such as swamp shells and gating actions, which can be used to exploit vulnerabilities in blue team defenses. Gain valuable insights into potential security risks and enhance your understanding of how attackers might misuse legitimate tools for nefarious activities.
Syllabus
Introduction
Reviewing the Logs
Weaponizing Splunk
Extracting Data
Swamp Shells
Command Control
Gating Actions
Related Courses
Big Data - Capstone ProjectUniversity of California, San Diego via Coursera Microsoft SharePoint 2016: Authentication and Security
Microsoft via edX Security in Office 365
Microsoft via edX The Complete Splunk Enterprise Certified Admin Course
Udemy Splunk Hands-on - The Complete Data Analytics using Splunk
Udemy