Skip to content

indrikalis/ActiveDirectory-Splunk-Sysmon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

16 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ActiveDirectory-Splunk-Sysmon

πŸ“Œ Overview

This project demonstrates the implementation of Sysmon and Splunk Enterprise to monitor, detect, and analyze attack activities in a Windows Active Directory environment.

The lab simulates a brute force attack from Kali Linux against a Windows domain user, and analyzes the generated logs using Splunk dashboards.

πŸ§ͺ Lab Environment

  • Windows 10 (Domain Client)
  • Windows Server (AD DC)
  • Ubuntu Server (Splunk Enterprise)
  • Kali Linux (Attacker)
  • VirtualBox (NAT Network)

🧩 Network Topology

Topologi AD Project

πŸ›  Tools Used

  • Splunk Enterprise
  • Splunk Universal Forwarder
  • Sysmon
  • Kali Linux
  • xfreerdp

πŸ“‚ Documentation

⚠ Disclaimer

This project is created for educational and authorized lab purposes only.

About

No description or website provided.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published