Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

📝 Case Study: Incident Handling with Splunk

🔹 Overview

In this case study, I revisited the Introductory Splunk SOC Room on TryHackMe. The exercise focused on analyzing server logs to investigate attacks on imreallynotbatman.com.

Skills demonstrated:


🔍 Key Activities & Highlights

1. Reconnaissance Phase

Reconnaissance CVE

CMS Detected

Scanner Identified

Other findings:


2. Exploitation Phase

Successful Login


3. Installation Phase

Process Execution

VirusTotal Lookup


4. Action on Objectives

SQL Injection Detected


5. Command & Control Phase


6. Weaponization Phase


7. Delivery Phase

Malware Lookup


8. Conclusion

Through this hands-on case study, I practiced:

This exercise reinforced my ability to work with Splunk and Suricata alerts to investigate real-world security incidents.


🔗 Navigation