⭐ Day 8 – Windows & Linux Security Logs Deep Dive

Today students will learn:

  • How to read Windows security logs (Event IDs)
  • How to read Linux security logs (auth.log, syslog)
  • How to detect attacks using these logs
  • How to search effectively in Splunk

🧠 1. Why Windows & Linux Logs Are Important for SOC

In real SOC:

πŸ”Ή 80% of alerts come from Windows logs
πŸ”Ή 20% from Linux logs

These logs help detect:

  • Brute force
  • Lateral movement
  • Privilege escalation
  • Persistence
  • Malware execution
  • Admin misuse

🟦 2. Windows Security Logs

Windows logs use Event ID numbers.
SOC analysts must know these common ones:


πŸ”₯ Top Windows Event IDs (with simple meaning)

4624 – Successful Login

User logged in successfully.
Important fields:

  • Logon_Type
  • IP
  • Username

4625 – Failed Login

Wrong password / brute force attempts.

4648 – Logon Using Explicit Credentials

Hacker using β€œrunas” or stolen password.

4672 – Special Privileges Assigned

User became Admin.
Possible privilege escalation.

4720 – New User Created

Possible persistence technique.

4732 – User Added to Admin Group

High risk β€” attacker gaining control.

7045 – New Service Installed

Can indicate malware persistence.


πŸ” Windows Logon Types (Very important)

This helps identify MITRE tactics quickly.

Logon TypeMeaningAttack Use
2Local loginInternal user
3Network loginSMB, file share
4BatchScheduled tasks
5ServiceMalware installs
7Unlock workstationNot suspicious
10Remote Login (RDP)Lateral movement
11Cached loginOffline login

πŸ”Ž 3. Splunk Queries for Windows Logs

Successful Logins (4624)

index=* EventCode=4624

Failed Logins (4625)

index=* EventCode=4625

RDP Logins (Logon Type 10)

index=* EventCode=4624 Logon_Type=10

New User Created (Attack Possible)

index=* EventCode=4720

Privilege Escalation (4672)

index=* EventCode=4672


🟩 4. Linux Security Logs – Explaining Auth.log & Syslog

Linux stores logs in:

/var/log/auth.log
/var/log/syslog


πŸ”₯ Common Linux Log Patterns (Easy)

Failed SSH Login

Failed password for invalid user

Successful SSH Login

Accepted password for user

User Switching (sudo)

sudo: user : TTY=pts/0 ; PWD=/home ; COMMAND=/bin/bash

New user added

useradd[1234]: new user: name=bob uid=1002

Root login

session opened for user root


πŸ” Splunk Queries for Linux Logs

Failed SSH logins

index=* "Failed password"

Successful SSH logins

index=* "Accepted password"

Sudo commands

index=* "sudo"

Root access

index=* "session opened for user root"

New user created

index=* "useradd" OR "adduser"


πŸ§ͺ 5. Day 8 Hands-On Tasks

Task 1 – Detect brute force on Windows

index=* EventCode=4625
| stats count by Account_Name, IpAddress


Task 2 – Detect SSH brute force on Linux

index=* "Failed password"
| stats count by src_ip
| where count > 5


Task 3 – Detect RDP lateral movement

index=* EventCode=4624 Logon_Type=10


Task 4 – Detect new admin user (Windows)

index=* EventCode=4732


Task 5 – Detect root login (Linux)

index=* "session opened for user root"


🎀 Trainer Script (Say This in Class)

β€œWindows and Linux logs tell the real story of what happened.
As a SOC analyst, if you can read logs, you can detect attacks.
Logs + MITRE = professional detection skills.”


πŸ“ Homework

Students submit:

  1. One Windows Event ID
  2. One Linux log pattern
  3. Splunk query
  4. MITRE mapping

Example:

  • EventCode 4625
  • Failed SSH password
  • MITRE T1110 Brute Force

Leave a comment

Recent posts

Quote of the week

in learning you will teach and in teaching you will learn

~ Phil Collins
Design a site like this with WordPress.com
Get started