This course teaches learners how to weaponize Splunk for offensive purposes using Blue Teams techniques. The course covers reviewing logs, extracting data, using swamp shells, command control, and gating actions. The teaching method involves practical demonstrations and examples. The course is intended for individuals interested in cybersecurity, particularly Blue Teams and offensive security.
Overview
Syllabus
Introduction
Reviewing the Logs
Weaponizing Splunk
Extracting Data
Swamp Shells
Command Control
Gating Actions