Главная
Study mode:
on
1
Intro
2
The Story
3
Overview
4
What is Splunk
5
Splunk Syslog
6
Deployment Server
7
Deployment Server Demo
8
Misconfigurations
9
Attack surfaces
10
Reviewing logs
11
User privileges
12
SSH keys
13
Demo
14
Attacking Server
15
Using Metasploit
16
Using Python
17
Windows App
18
PowerShell
19
Attack of the Data
20
WiFi Pineapple
21
WiFi Pineapple App
22
Hashcat
23
Contact Info
24
Split Data
Description:
Explore a conference talk from BSides Nashville 2017 that delves into the potential misuse of Splunk, a popular log management and analysis tool. Learn about the various attack surfaces and misconfigurations that can be exploited in Splunk deployments. Discover how attackers can leverage Splunk's features, including syslog and deployment servers, to gain unauthorized access and execute malicious actions. Witness demonstrations of exploiting vulnerabilities using Metasploit and Python, as well as attacking Windows systems through PowerShell. Gain insights into data-driven attacks using tools like WiFi Pineapple and Hashcat. Understand the importance of proper configuration and security measures to protect Splunk installations from potential weaponization.

Weaponizing Splunk - Using Blue Team Tools for Evil

Add to list
0:00 / 0:00