my-cybersecurity-portfolio

🧰 Skills Applied

πŸ›  Tools Used

Splunk

CyberChef

AbuseIPDB / WHOIS lookup

Windows Event Logs

Security Onion (optional)

βœ” Summary of Findings

Detected repeated failed login attempts followed by 1 successful login

Identified suspicious IP addresses with poor reputation

Found evidence of brute-force behavior (multiple failed attempts with short intervals)

Confirmed login did not match the user’s normal location

Recommended password reset, MFA enforcement, session termination, and IP blocking

πŸ›‘οΈ Incident Response: Suspicious Login & Brute-Force Attempt

Overview 🧩 MITRE ATT&CK Techniques

T1110 β€” Brute Force

T1078 β€” Valid Accounts Investigated a suspicious sequence of failed login attempts followed by a successful login, indicating a potential brute-force or credential compromise attack. Used Splunk to analyze authentication logs and executed containment procedures.


πŸ” Scenario

SIEM alerts flagged:


πŸ› οΈ Tools Used


πŸ”¬ Investigation Summary

1. Log Analysis in Splunk

index=auth sourcetype=linux_secure user="example_user" 
| stats count by src_ip, action, _time

Findings:


2. IP Reputation Check


3. User Verification

User confirmed:


4. Containment


βœ” Final Outcome

Attack was disrupted before lateral movement occurred. No data exposure or privilege escalation detected. Enhanced rules for login-based alerts.