SIEM setup

SIEM setup

15-September-2025 + 14-October-2025 • Attacks & SIEM

Objective

set up splunk to log when things happen :)

Steps

Step 1

The lab setup needs its 'victim' machine to be monitored to forward its logs to Splunk. We're gonna use the Splunk Universal Forwarder for this - Splunk won't let me login from the VM's web browsers, so I downloaded it outside, downloaded OpenSSH again. (I allow it through the firewall, but it should be ok because in order to SSH in it'll ask for my login details.)

Step 1

Step 2

here's our PuTTY command again (replace single ' with double quotes)


                  pscp 'C:\Users\jessr\Downloads\shared\splunkforwarder-10.0.0-windows-x64.msi' rui@192.168.0.48:C:\Users\rui\Downloads
                

Step 3

Now we setup to forward to our ubuntu server's static IP address (indexer? that's me!!! the ubuntu VM!)

Step 3

Step 4

There are some config files to check here:


                  C:\Program Files\SplunkUniversalForwarder\etc\system\local\
                

Step 5

output.conf determines where to send logs.

Step 5

Step 6

We also are gonna make inputs.conf (to tell splunk which types of logs to send)

Step 6

Step 7

Open cmd and restart the universal forwarder...

Step 7

Step 8

Start the ubuntu server (VM) and login to splunk. Then we go to Settings > Forwarding/Receiving > Receive data > listen to port 9997, and save

Step 8

Step 9

on the endpoint (win10), we're gonna run this command to make sure the forwarder connected.


                  & 'C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe' list forward-server
                

Step 10

It lists active forwards to my server VM static IP (allegedly), but I had some login issues. I stopped the server, deleted all users (deleting passwd.cong), reset my password using user-seed.conf, restarted the server... and finally, it listed active servers.

Step 11

we're gonna search splunk and... perfect!

Step 11

Step 12

We're gonna generate some events to test it out. First up: failed network login attempts (e.g. connecting to share files, or remote desktop) - open powershell on the victim computer and type this, which runs the command 5 times (log into my own IP address - 127.0.0.1 is a loopback - using IPC$ (interprocess communication) - using these credentials


                  for ($i=0; $i -lt 5; $i++) { cmd /c ''net use \\127.0.0.1\ipc$ /user:wronguser notpassword''' }
                

Step 13

Step 13

Step 14

a failed login of this type comes up as event code 4625, so we can search that:


                  index=* sourcetype=''WinEventLog:Security'' EventCode=4625
                

Step 15

yes! that's me!

Step 15

Step 16

all that troubleshooting took a little bit out of me, so I'm gonna go over some more events over the coming posts ;)

Notes / Lessons Learned

  • Keep your passwords secure. 8+ characters, Aa + 123 + *

Sources