Splunk Basics - Did you SIEM? Tryhackme

Master Splunk for log analysis with hands-on cybersecurity challenges in the TryHackMe Advent of Cyber 2025 room. Enhance your SIEM skills, detect threats, analyze logs, and strengthen blue team defensive capabilities.

OFFENSIVE SECURITYADVENT OF CYBER 2025DETECTIONLOG ANALYSISPENETRATION TESTERSPLUNK TUTORIALSTRYHACKME WALKTHROUGHCYBERSECURITY CHALLENGESTHREAT DETECTIONTRYHACKME ROOM SOLUTIONSTRYHACKME ANSWERSCYBERSECURITY LABSBLUE TEAM TRAININGCYBERSECURITYETHICAL HACKINGOPEN-SOURCE TOOLSAI HACKINGHANDS ON SECURITY LABSSECURITY OPERATIONS (SOC)

Jawstar

12/7/20251 min read

Answer the questions below

What is the attacker IP found attacking and compromising the web server?
198.51.100.55
Which day was the peak traffic in the logs? (Format: YYYY-MM-DD)
2025-10-12
What is the count of Havij user_agent events found in the logs?
993
How many path traversal attempts to access sensitive files on the server were observed?
658
Examine the firewall logs. How many bytes were transferred to the C2 server IP from the compromised web server?
126167
If you enjoyed today's room, check out the Incident Handling With Splunk room to learn more about analyzing logs with Splunk.
No Answer Needed

Task 2 : Log Analysis with Splunk

Subscribe for all Days Answers of Advent of Cyber 2025