Threat Hunting with Splunk

Investigations can be time-sensitive and complex. Having a set of ready-to-use queries helps me quickly filter through large volumes of data to identify suspicious activities and potential threats. This cheat sheet is meant to speed up that process and reduce the guesswork when searching through logs.

What You’ll Find in the Cheat Sheet:

  • Queries to detect unusual process executions

  • Searches for network anomalies

  • Checks for file changes that might indicate compromise

  • Queries focused on spotting abnormal user behavior

Each query is practical and designed to cover common real-world scenarios that analysts encounter daily.

How You Can Use It:
Whether you’re a SOC analyst, threat hunter, or security enthusiast, this cheat sheet can be a handy tool to have on hand during investigations. You can use it as a starting point and customize the queries to fit your environment.

Where to Access the Cheat Sheet:
You can find the full cheat sheet and explore the repository here:
https://github.com/lucsemassa/splunk_threat_hunting

Feel free to use it, share it, and contribute if you want to improve or add more queries!

Share this post

About the author

AdminStar@

Offensive Security Experienced Penetration Tester (OSEP)
Offensive Security Web Expert (OSWE)
Offensive Security Certified Professional (OSCP)
Certified Soc Analyst (CSA)
Certified Ethical Hacker (CEH)
Web Developer

View all posts

Leave a Reply

Your email address will not be published. Required fields are marked *