InInfoSec Write-upsbyGhostploitSplunk Series: Masking Sensitive Data (Part 5)Hello, my digital adventurers! I am here with a new Splunk blog.Feb 7Feb 7
InInfoSec Write-upsbyGhostploitSplunk Series: Creating a Dashboard to Visualize Your Data (Part 4)Hello, my digital adventurers! I would say that Dashboards are essential for quickly understanding and interacting with data. They give you…Jan 28Jan 28
InInfoSec Write-upsbyGhostploitSplunk series: Rule Development (Part 3)Hello, my digital adventurers! In today’s blog, I will show you how to create a rule or alert (in Splunk terms) in Splunk. This is the 3rd…Jan 24Jan 24
InInfoSec Write-upsbyGhostploitSplunk Series: Forwarding Logs Using Universal Forwarder (Part 2)Hello, my digital adventurers. This is the 2nd part of my Splunk series. In this blog, I will show you how to send logs to the Splunk…Jan 21Jan 21
InInfoSec Write-upsbyGhostploitSplunk Series: Installation Guide for Windows and Linux (Part 1)Hello, my digital adventurers. This is the first part of my Splunk series. I will share more insights about Splunk in my upcoming articles.Jan 19Jan 19