Hmm, I'm not too familiar with the Splunk-specific tools like btool and btprobe. I'll need to make sure I understand how those work in the context of Splunk before deciding if they're relevant here.
Ah, I've seen questions like this before. The key is to identify which stage of the attack lifecycle the question is referring to. Let me think through the options carefully.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Sage
4 months agoLauryn
4 months agoRegenia
4 months agoXuan
4 months agoEmeline
4 months agoLeigha
5 months agoLeonora
5 months agoStephen
5 months agoOra
5 months agoDeangelo
5 months agoElli
5 months agoRossana
5 months ago