Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

At Splunk, you may hear us pontificating on our ponies about how awesome and easy it is to use Splunk to hunt for threats.

Why, all you need to do is use X and Y with Splunk to find a Z score (no zombies were injured) and BOOM! That baddie in your network is detected.

Going back to at least a decade, we’ve tried to make it easy — as you’ll see in the resources below — and yet threat hunting is about as easy as telling someone how easy it is to draw an owl. (Hint: it isn’t.) So, that’s why we started writing this series in 2017.

Today, we are doubling-down on our threat hunting capabilities. That's why we're updating this series, one article at a time, verifying that each tutorial is the best resource for some aspect of hunting, all using Splunk.

Show me the tutorials!

Want to learn more about threat hunting in general? Keep reading for more information about hunting and the team behind this series, SURGe.

Threat Hunting resources

So, let's make it clear, this entire series is about using Splunk for your threat hunting activities.

Here's some brand new and forever-favorite resources, too, that are about threat hunting with or without Splunk:

Meet the team

The team behind this series is SURGe, an in-house security research team at Splunk. The SURGe team focuses on in-depth analysis of the latest cybersecurity news and finding answers to security problems. All of this is delivered to you in a variety of forms:

Check out all these resources from SURGe and sign up for rapid response alerts.

And now, onto the hunting tutorials!

Tutorials for threat hunting with Splunk

This series will serve as your foundation for hunting with Splunk. (Brand new to Splunk? Explore our SIEM solution, Splunk Enterprise Security: Learn about Splunk ES | Tour Splunk ES)

Each of these articles take a single Splunk search command or hunting concept and break it down to its basic parts. We will help you create a solid base of Splunk knowledge that you can then use in your own environment to hunt for evil. We will cover everything from hypothesis generation to IDS. Splunk commands like stats, eval and lookups will be examined. And have we got queries for you!

As always, happy hunting!

Related Articles

Level Up Your Cybersecurity with Risk-Based Alerting
Security
3 Minute Read

Level Up Your Cybersecurity with Risk-Based Alerting

In our first blog in the Splunk RBA series, we introduced Risk-Based Alerting (RBA) and covered the basic principles of RBA. In the rest of this series, we explain how you can plan and then implement RBA within your organization.
Splunk Unified Security Operations for Digital Resilience at RSA Conference 2023
Security
3 Minute Read

Splunk Unified Security Operations for Digital Resilience at RSA Conference 2023

Splunk is excited to be joining the cybersecurity community back at the Moscone Center in April for RSA Conference 2023, and to share how we can help unify, simplify and modernize your security operations.
Baselining and Beyond: What's New in OT Security Add-On v2.2
Security
5 Minute Read

Baselining and Beyond: What's New in OT Security Add-On v2.2

Splunk has released a new version of OT Security Add-On, designed to help organizations understand their cybersecurity risks, improve their security monitoring, and better detect and react to industrial cybersecurity threats.
The State of Security 2023: Collaboration Is Essential For Building Resilience
Security
4 Minute Read

The State of Security 2023: Collaboration Is Essential For Building Resilience

Explore the trends and findings in our new report, The State of Security 2023, detailing research on the challenges and opportunities ahead for security leaders and teams.
Using Workflow Actions & OSINT for Threat Hunting in Splunk
Security
6 Minute Read

Using Workflow Actions & OSINT for Threat Hunting in Splunk

Two things will make you a more efficient & effective security analyst: OSINT and workflow actions in Splunk. We've got you covered in this article.
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise
Security
9 Minute Read

Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise

In this Splunk blog post, we aim to equip defenders with the necessary tools and strategies to actively hunt down and counteract this campaign. Additionally, we will offer some resilient analytic ideas that can serve as a foundation for future threat detection and response efforts.
Who's the Boss? EMEA Boss Of The SOC DAY 2023
Security
2 Minute Read

Who's the Boss? EMEA Boss Of The SOC DAY 2023

Boss of the SOC (BOTS) is Splunk’s blue-team capture the flag-esque competition in which defenders use Splunk’s suite of security products to find APT threats, discover attacks and figure out what happened to our favorite virtual organization “Frothly Brewing Co.”
What Generative AI Means For Cybersecurity: Risk & Reward
Security
5 Minute Read

What Generative AI Means For Cybersecurity: Risk & Reward

Learn the risks and rewards of generative AI in cybersecurity.
Staff Picks for Splunk Security Reading March 2023
Security
5 Minute Read

Staff Picks for Splunk Security Reading March 2023

In this month's Staff Picks blog, our Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.