Splunk-based threat hunting case study analyzing reconnaissance activity using the BOTS v2 dataset, focused on detecting anomalous user agents, pivoting to source IPs, and extracting actionable IOCs.
-
Updated
Apr 3, 2026
Splunk-based threat hunting case study analyzing reconnaissance activity using the BOTS v2 dataset, focused on detecting anomalous user agents, pivoting to source IPs, and extracting actionable IOCs.
A hands-on Splunk threat hunting investigation focused on identifying initial access through spearphishing, user execution patterns, and IOC development.
This project simulates a proactive threat hunt based on a law enforcement advisory. Using the BOTSv2 (Boss of the SOC) dataset within Splunk, I identified an adversary conducting stealthy reconnaissance using a non-standard browser (Naenara) over port 80.
Add a description, image, and links to the botsv2 topic page so that developers can more easily learn about it.
To associate your repository with the botsv2 topic, visit your repo's landing page and select "manage topics."