Unit 18 Homework: Lets go Splunking! Scenario You have just been hired as an SOC Analyst by Vandalay Industries, an importing and exporting company. Vandalay Industries uses Splunk for their security...

1 answer below »

Unit 18 Homework: Lets go Splunking!



Scenario


You have just been hired as an SOC Analyst by Vandalay Industries, an importing and exporting company.




  • Vandalay Industries uses Splunk for their security monitoring and have been experiencing a variety of security issues against their online systems over the past few months.




  • You are tasked with developing searches, custom reports and alerts to monitor Vandalay's security environment in order to protect them from future attacks.





System Requirements


You will be using the Splunk app located in the Ubuntu VM.



Your Objective


Utilize your Splunk skills to design a powerful monitoring solution to protect Vandaly from security attacks.


After you complete the assignment you are asked to provide the following:



  • Screen shots where indicated.

  • Custom report results where indicated.



Topics Covered in This Assignment



  • Researching and adding new apps

  • Installing new apps

  • Uploading files

  • Splunk searching

  • Using fields

  • Custom reports

  • Custom alerts


Let's get started!





Vandalay Industries Monitoring Activity Instructions



Step 1: The Need for Speed



Background: As the worldwide leader of importing and exporting, Vandalay Industries has been the target of many adversaries attempting to disrupt their online business. Recently, Vandaly has been experiencing DDOS attacks against their web servers.


Not only were web servers taken offline by a DDOS attack, but upload and download speed were also significantly impacted after the outage. Your networking team provided results of a network speed run around the time of the latest DDOS attack.



Task:
Create a report to determine the impact that the DDOS attack had on download and upload speed. Additionally, create an additional field to calculate the ratio of the upload speed to the download speed.




  1. Upload the following file of the system speeds around the time of the attack.



    • Speed Test File




  2. Using the
    eval
    command, create a field called
    ratio
    that shows the ratio between the upload and download speeds.



    • Hint: The format for creating a ratio is:
      | eval new_field_name = 'fieldA' / 'fieldB'




  3. Create a report using the Splunk's
    table
    command to display the following fields in a statistics report:




    • _time


    • IP_ADDRESS


    • DOWNLOAD_MEGABITS


    • UPLOAD_MEGABITS


    • ratio


    Hint: Use the following format when for the
    table
    command:
    | table fieldA fieldB fieldC




  4. Answer the following questions:



    • Based on the report created, what is the approximate date and time of the attack?

    • How long did it take your systems to recover?




Submit a screen shot of your report and the answer to the questions above.



Step 2: Are We Vulnerable?



Background:
Due to the frequency of attacks, your manager needs to be sure that sensitive customer data on their servers is not vulnerable. Since Vandalay uses Nessus vulnerability scanners, you have pulled the last 24 hours of scans to see if there are any critical vulnerabilities.




Task:
Create a report determining how many critical vulnerabilities exist on the customer data server. Then, build an alert to notify your team if a critical vulnerability reappears on this server.




  1. Upload the following file from the Nessus vulnerability scan.



    • Nessus Scan Results




  2. Create a report that shows the
    count
    of critical vulnerabilities from the customer database server.



    • The database server IP is
      10.11.36.23.

    • The field that identifies the level of vulnerabilities is
      severity.




  3. Build an alert that monitors every day to see if this server has any critical vulnerabilities. If a vulnerability exists, have an alert emailed to
    [email protected].




Submit a screenshot of your report and a screenshot of proof that the alert has been created.



Step 3: Drawing the (base)line



Background:
A Vandaly server is also experiencing brute force attacks into their administrator account. Management would like you to set up monitoring to notify the SOC team if a brute force attack occurs again.



Task:
Analyze administrator logs that document a brute force attack. Then, create a baseline of the ordinary amount of administrator bad logins and determine a threshold to indicate if a brute force attack is occurring.




  1. Upload the administrator login logs.



    • Admin Logins




  2. When did the brute force attack occur?



    • Hints:

      • Look for the
        name
        field to find failed logins.

      • Note the attack lasted several hours.






  3. Determine a baseline of normal activity and a threshold that would alert if a brute force attack is occurring.




  4. Design an alert to check the threshold every hour and email the SOC team at
    [email protected]
    if triggered.




Submit the answers to the questions about the brute force timing, baseline and threshold. Additionally, provide a screenshot as proof that the alert has been created.



Your Submission


In a word document, provide the following:



  • Answers to all questions where indicated.

  • Screenshots where indicated.

Answered 10 days AfterJul 26, 2021

Answer To: Unit 18 Homework: Lets go Splunking! Scenario You have just been hired as an SOC Analyst by Vandalay...

Prince answered on Aug 01 2021
153 Votes
Player_Dealer_Correlation/Dealers_working_during_losses
05:00:00 AM Billy Jones
08:00:00 AM Billy
Jones
02:00:00 PM Billy Jones
08:00:00 PM Billy Jones
11:00:00 PM Billy Jones
05:00:00 AM Billy Jones
08:00:00 AM Billy Jones
02:00:00 PM Billy Jones
08:00:00 PM Billy Jones
11:00:00 PM Billy Jones
05:00:00 AM Billy Jones
08:00:00 AM Billy Jones
02:00:00 PM Billy Jones
Player_Dealer_Correlation/finder.sh
for a in 0310 0312
do
    for b in '05:00:00 am' '08:00:00 am' '02:00:00 pm' '08:00:00 pm' '11:00:00 pm'
    do
        grep -i "${b}" ${a}_Dealer_schedule | \awk '{print $1,$2,$5,$6}' >> Dealers_working_during_losses
    done
done
for a in 0315
do
    for b in '05:00:00 am' '08:00:00 am' '02:00:00 pm'
    do
        grep -i "${b}" ${a}_Dealer_schedule | \awk '{print $1,$2,$5,$6}' >> Dealers_working_during_losses
    done
done
Player_Dealer_Correlation/Notes_Dealer_Analysis
Everytime the loss occoured, dealer Billy Jones was dealing in roulette
Billy worked a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here