basic basic attack types
15-September-2025 • Attacks & SIEM
Objective
Brute force some attacks and watch them pop up on Splunk :)
Steps
Step 1
The lab setup needs its 'victim' machine to be monitored to forward its logs to Splunk. We're gonna use the Splunk Universal Forwarder for this - Splunk won't let me login from the VM's web browsers, so I downloaded it outside, downloaded OpenSSH again. (I allow it through the firewall, but it should be ok because in order to SSH in it'll ask for my login details.)

Step 2
here's our PuTTY command again (replace single ' with double quotes)
pscp 'C:\Users\jessr\Downloads\shared\splunkforwarder-10.0.0-windows-x64.msi' rui@192.168.0.48:C:\Users\rui\Downloads
Step 3
Now we setup to forward to our ubuntu server's static IP address (indexer? that's me!!! the ubuntu VM!)
