Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

At Splunk, you may hear us pontificating on our ponies about how awesome and easy it is to use Splunk to hunt for threats.

Why, all you need to do is use X and Y with Splunk to find a Z score (no zombies were injured) and BOOM! That baddie in your network is detected.

Going back to at least a decade, we’ve tried to make it easy — as you’ll see in the resources below — and yet threat hunting is about as easy as telling someone how easy it is to draw an owl. (Hint: it isn’t.) So, that’s why we started writing this series in 2017.

Today, we are doubling-down on our threat hunting capabilities. That's why we're updating this series, one article at a time, verifying that each tutorial is the best resource for some aspect of hunting, all using Splunk.

Show me the tutorials!

Want to learn more about threat hunting in general? Keep reading for more information about hunting and the team behind this series, SURGe.

Threat Hunting resources

So, let's make it clear, this entire series is about using Splunk for your threat hunting activities.

Here's some brand new and forever-favorite resources, too, that are about threat hunting with or without Splunk:

Meet the team

The team behind this series is SURGe, an in-house security research team at Splunk. The SURGe team focuses on in-depth analysis of the latest cybersecurity news and finding answers to security problems. All of this is delivered to you in a variety of forms:

Check out all these resources from SURGe and sign up for rapid response alerts.

And now, onto the hunting tutorials!

Tutorials for threat hunting with Splunk

This series will serve as your foundation for hunting with Splunk. (Brand new to Splunk? Explore our SIEM solution, Splunk Enterprise Security: Learn about Splunk ES | Tour Splunk ES)

Each of these articles take a single Splunk search command or hunting concept and break it down to its basic parts. We will help you create a solid base of Splunk knowledge that you can then use in your own environment to hunt for evil. We will cover everything from hypothesis generation to IDS. Splunk commands like stats, eval and lookups will be examined. And have we got queries for you!

As always, happy hunting!

Related Articles

Only the Paranoid Survive, Recast for Cybersecurity
Security
4 Minute Read

Only the Paranoid Survive, Recast for Cybersecurity

At TruSTAR, we want to highlight stories of success in defending cyberspace that can propagate as best practices. Read more about human dependencies, technical challenges and defining data to be shared.
Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…
Security
13 Minute Read

Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…

Even if you haven’t uncovered Microsoft Exchange Vulnerabilities and malicious behavior, it is important to continue monitoring, particularly as more actors look to leverage these vulnerabilities for their own purposes.
Visual Link Analysis with Splunk: Part 4 - How is this Pudding Connected?
Security
3 Minute Read

Visual Link Analysis with Splunk: Part 4 - How is this Pudding Connected?

Starting with a single piece of data, use Splunk link analysis functionality to find related links going multiple levels down.
Splunk for OT Security V2: SOAR and More
Security
3 Minute Read

Splunk for OT Security V2: SOAR and More

OT attacks are on the rise, as we've seen from the Oldsmar water facility attack. the Splunk IoT, Manufacturing and Energy team has been hard at work improving Splunk for OT Security to help secure your environment.
Cloud Federated Credential Abuse & Cobalt Strike: Threat Research February 2021
Security
4 Minute Read

Cloud Federated Credential Abuse & Cobalt Strike: Threat Research February 2021

Learn about the latest emerging threats, such as Cloud Federated Credential Abuse and Cobalt Strike, where bad actors are abusing credential privileges in cloud environments to gain unauthorized access.
Building a Superstar SOC with Automation and Standardization
Security
2 Minute Read

Building a Superstar SOC with Automation and Standardization

Splunker Kelly Huang explains the how and why of standardizing your team's security processes to build a superstar SOC.
Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk
Security
9 Minute Read

Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk

This blog discusses how to detect HAFNIUM activity around the recent CVEs released affecting Exchange Server using Splunk and Splunk Enterprise Security.
From the SecOps Kitchen: Why Operators of Essentials Services Need to Prepare Now
Security
2 Minute Read

From the SecOps Kitchen: Why Operators of Essentials Services Need to Prepare Now

How can you be agile and map technical security activities back to the overall goal to reduce the business risk and become cyber resilient while being sensitive to costs and FTE needs at the same time? Find out more in this article.
Stories of Cyber Defense Collaboration: Trustworthy Accountability Group (TAG)
Security
4 Minute Read

Stories of Cyber Defense Collaboration: Trustworthy Accountability Group (TAG)

Nicole Perloth’s new book, This is How They Tell Me the World Ends, details our past and troubling trajectory in cyberspace. It is a terrific and sobering read for both the initiated and uninitiated in information security. This doom and gloom title prompts the need for a blog series focusing on slivers of success in defending cyberspace that can propagate as best practices.