Creating and formatting tables
Up to this point, we have learned various basic commands in Splunk. From this point on, we will use the features of Splunk that we have learned so far to analyze the data in the Bots Dataset v1
app. What are we looking for? We are looking for indications of a compromise. Be aware that this is not an extensive analysis of the logs. In fact, we will look at only some of the logs with the goal of understanding the data as well as applying some of the commands that we have covered. You are encouraged to further analyze the logs once you are comfortable with the material.
You are advised that the logs in the Bots Dataset v1
app consist of data from an actual, real-life malicious attack. As a result, you may come across profane language or questionable material in fields such as URLs. We have attempted to ensure that snapshots and other material in this book do not contain anything offensive.
We begin this section by looking at the Internet Information...