Skip to main content

Threat Hunting

loading · loading ·

2025

DHCP Log Analysis Using Splunk
·1383 words·7 mins· loading · loading
SIEM Threat Hunting Splunk DHCP Logs Log Analysis Cybersecurity
Analyzing DHCP Log Files Using Splunk SIEM # Introduction # Dynamic Host Configuration Protocol (DHCP) log files contain valuable information about IP address assignments, lease durations, client requests, and server responses.
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins· loading · loading
Cybersecurity Splunk Threat Hunting DNS Analysis Splunk SIEM Threat Intelligence DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.
Threat Hunting with OSINT and Splunk: A Hands-on Guide
·1399 words·7 mins· loading · loading
Cybersecurity Threat Hunting OSINT OSINT Splunk Threat Hunting Cybersecurity SIEM Kali Linux
Learn how to use OSINT tools like Shodan and analyze security logs in Splunk to detect and mitigate cyber threats.