Splunk Tech Talks
Deep-dives for technical practitioners.

Detecting Remote Code Executions With the Splunk Threat Research Team

WhitneySink
Splunk Employee
Splunk Employee

WATCH NOW

Screenshot 2024-05-23 at 6.45.44 AM.png

Remote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, they allow attackers to easily execute arbitrary code on affected systems without authentication — and open the door to use additional tactics and techniques to cause further harm.

To support defenders against these attacks, the Splunk Threat Research Team regularly creates new out-of-the-box security content for use in Splunk Enterprise Security. Join this Tech Talk to learn more from Michael Haag, Principal Threat Researcher, who will provide:

  • An overview of the latest security content the team has developed to defend against RCEs
  • Best practices for implementing and using this content
  • A walkthrough of the detection engineering process the Splunk Threat Research Team follows to create security content for defending against CVEs

WATCH NOW

Tags (1)
WhitneySink
Splunk Employee
Splunk Employee

These are the gists referenced on the tech talk walking you through how to setup docker containers with nginx:

https://gist.github.com/MHaggis/e106367f6649fbb09ab27e7b4a01cf73

https://gist.github.com/MHaggis/26f59108b04da8f1d870c9cc3a3c8eec

 

WhitneySink
Splunk Employee
Splunk Employee

Q&A from the session

 

Q: How can I stay up-to-date on content releases from the Threat Research Team?

A: The Community: Every month, we post a recap in the Product News & Announcements section with a list of all the new and updated security content we’ve released, plus links to learn more about each detection on research.splunk.com. You can find previous recaps here.

 

Q: Where can I find the latest research from the Threat Research Team?

A:  The Splunk blog: We regularly post research and guidance related to the latest tactics, techniques, and procedures we see adversaries using in the wild. You can find all posts authored by the Splunk Threat Research Team here.

 

Q: Will the Threat Research Team be presenting at .conf this year?

A:  Yes! Members of the Threat Research Team will be presenting a number of sessions. You can check out all of the security sessions that will be happening at .conf here.

 

Q: Please describe an efficient method to detect ransomware attack. Personally I like analyze entrophy of files but is that not too late?

A: We have a greater chance to prevent ransomware by reducing the attack surface using products like - WDAC (windows defender application control), Microsoft Windows AppLocker or ASR rules (Attack Surface Reduction rules). On the mail gateway side, restrict the amount of allowed ingress file extensions (HTA, CHM, JS, VBS, and so on) will help reduce the amount of ransomware or malicious files to the mailbox.
Using entropy to identify the files will be too late, unfortunately.


Q: Will any of these vulnerabilities be exercises in Boss of the SOC?

A: Not that STRT is aware of, unsure.

 

Please feel free to post additional questions here for us to respond to as you rewatch the Tech Talk and demo.

WhitneySink
Splunk Employee
Splunk Employee

And here are some questions for YOU:

  • What other types of resources would help you make the most of Splunk's pre-built security detections?
  • Are there any threat detection topics or use cases you're especially interested in learning more about?

We'd love to hear from you!

 

Get Updates on the Splunk Community!

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...