Member-only story

Splunk series: Rule Development (Part 3)

Ghostploit
InfoSec Write-ups
Published in
5 min readJan 24, 2025

Hello, my digital adventurers! In today’s blog, I will show you how to create a rule or alert (in Splunk terms) in Splunk. This is the 3rd part of my series, and I will continue to share more insights about Splunk. If you want specific topics from me, you can ask in the comments section.

I will start with the most basic and well-known rule — the Brute Force Attack detection rule. I will write this rule for Windows. But before writing the rule, we must analyze which factors indicate a brute-force attack.

Explanation

As you know, Brute Force attacks involve repeatedly trying different passwords until the correct one is found. To perform brute force attacks, attackers can use different types of automated tools. Until the correct password is found, the attacker will make multiple failed attempts, and this is the key for us.

Image Source: https://www.sentinelone.com/

So that’s why we first look at Windows Event IDs to see failed login attempts. Until finding the right password, the attacker makes multiple attempts, and these attempts are logged with Event ID = 4625 in Security logs.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ghostploit

Cybersecurity Engineer | Sharing insights, lab writeups & more for the infosec community | x.com/ghostploit | linkedin.com/company/ghostploit

No responses yet

Write a response