π Tools Used
Splunk
CyberChef
AbuseIPDB / WHOIS lookup
Windows Event Logs
Security Onion (optional)
β Summary of Findings
Detected repeated failed login attempts followed by 1 successful login
Identified suspicious IP addresses with poor reputation
Found evidence of brute-force behavior (multiple failed attempts with short intervals)
Confirmed login did not match the userβs normal location
Recommended password reset, MFA enforcement, session termination, and IP blocking
T1110 β Brute Force
T1078 β Valid Accounts Investigated a suspicious sequence of failed login attempts followed by a successful login, indicating a potential brute-force or credential compromise attack. Used Splunk to analyze authentication logs and executed containment procedures.
SIEM alerts flagged:
index=auth sourcetype=linux_secure user="example_user"
| stats count by src_ip, action, _time
Findings:
User confirmed:
Attack was disrupted before lateral movement occurred. No data exposure or privilege escalation detected. Enhanced rules for login-based alerts.