Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

At Splunk, you may hear us pontificating on our ponies about how awesome and easy it is to use Splunk to hunt for threats.

Why, all you need to do is use X and Y with Splunk to find a Z score (no zombies were injured) and BOOM! That baddie in your network is detected.

Going back to at least a decade, we’ve tried to make it easy — as you’ll see in the resources below — and yet threat hunting is about as easy as telling someone how easy it is to draw an owl. (Hint: it isn’t.) So, that’s why we started writing this series in 2017.

Today, we are doubling-down on our threat hunting capabilities. That's why we're updating this series, one article at a time, verifying that each tutorial is the best resource for some aspect of hunting, all using Splunk.

Show me the tutorials!

Want to learn more about threat hunting in general? Keep reading for more information about hunting and the team behind this series, SURGe.

Threat Hunting resources

So, let's make it clear, this entire series is about using Splunk for your threat hunting activities.

Here's some brand new and forever-favorite resources, too, that are about threat hunting with or without Splunk:

Meet the team

The team behind this series is SURGe, an in-house security research team at Splunk. The SURGe team focuses on in-depth analysis of the latest cybersecurity news and finding answers to security problems. All of this is delivered to you in a variety of forms:

Check out all these resources from SURGe and sign up for rapid response alerts.

And now, onto the hunting tutorials!

Tutorials for threat hunting with Splunk

This series will serve as your foundation for hunting with Splunk. (Brand new to Splunk? Explore our SIEM solution, Splunk Enterprise Security: Learn about Splunk ES | Tour Splunk ES)

Each of these articles take a single Splunk search command or hunting concept and break it down to its basic parts. We will help you create a solid base of Splunk knowledge that you can then use in your own environment to hunt for evil. We will cover everything from hypothesis generation to IDS. Splunk commands like stats, eval and lookups will be examined. And have we got queries for you!

As always, happy hunting!

Related Articles

Automating With Splunk Phantom: How Norlys Does It
Security
2 Minute Read

Automating With Splunk Phantom: How Norlys Does It

Learn why Denmark’s largest power, utility and telecommunications company turned to Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology, to automate manual workflows, repetitive tasks and difficult-to-maintain processes.
Splunk SOAR Playbooks: Crowdstrike Malware Triage
Security
4 Minute Read

Splunk SOAR Playbooks: Crowdstrike Malware Triage

Splunk Phantom and Crowdstrike together allows you to have a smooth operational flow from detecting endpoint security alerts to operationalizing threat intelligence and automatically taking the first few response steps – all in a matter of seconds.
MSHTA and MSBuild Cat Jam: Threat Research Release January 2021
Security
4 Minute Read

MSHTA and MSBuild Cat Jam: Threat Research Release January 2021

Splunk's Security Research team was busy this past quarter generating attack data for 80% of all our detections. A step forward in validating and testing our security content and ensuring we can continually test detections via continuous integration and continuous delivery (CI/CD).
Staff Picks for Splunk Security Reading February 2021
Security
3 Minute Read

Staff Picks for Splunk Security Reading February 2021

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
A Path to Proactive Security Through Automation
Security
2 Minute Read

A Path to Proactive Security Through Automation

The sheer number of cyberattacks launched against organizations every year is massive and growing. Learn how automation can help your security team chart a new path forward.
Advanced Link Analysis: Part 1 - Solving the Challenge of Information Density
Security
5 Minute Read

Advanced Link Analysis: Part 1 - Solving the Challenge of Information Density

Leverage Sigbay's link analysis visualization to solve the challenge of information density.
Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR
Security
6 Minute Read

Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR

Box is the market leader for Cloud Content Management. Read on for more in this Q&A with Box's Kyle Bailey, Manager, Threat Operations.
Top 3 Market Trends for SOAR Solutions
Security
3 Minute Read

Top 3 Market Trends for SOAR Solutions

Lear more about the general market trends for SOAR, investment recommendations, and how Splunk Phantom aligns with Gartner’s vision for SOAR.
Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends
Security
5 Minute Read

Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends

Using Splunk for Link Analysis part 3, addressing loose ends with visual link analysis.