Midnight is a theme for GitHub Pages.
Platform: TryHackMe
Rooms Used: Logstash + Slingshot
Focus: SIEM deployment and web attack investigation using ELK Stack
This lab demonstrates the ability to:
The scenario simulates a compromised web server and requires performing a structured SOC investigation using Kibana.
All work performed in an isolated lab environment using simulated data.
Installed Elasticsearch and verified service availability.


Configured network binding and HTTP port in configuration file.

Installed Logstash and verified service status.

Configured pipeline to ingest web server logs.

Installed Kibana and verified service availability.

Configured Kibana to connect to Elasticsearch.


Enrolled and looged in ELK.

Scenario: suspicious activity detected on a web server. Investigation performed using filtering, aggregation and pivoting techniques.
Filtered web access logs in Kibana Discover to identify repeated requests targeting the authentication endpoint /admin-login.php. A single host generated an abnormal number of login attempts, indicating brute-force behaviour. The attacker’s IP address was identified as 10.0.2.15.

Applied a filter for source IP 10.0.2.15 (this IP is applied in all searches going forward) and HTTP method POST to isolate active interaction attempts rather than simple browsing. The request patterns revealed automated scanning behaviour consistent with a web enumeration tool.

Filtered events by attacker IP and analyzed the User-Agent field. The requests showed a recognizable signature associated with Gobuster, confirming directory enumeration activity.

Applied filters:
Counted all failed resource requests to quantify the enumeration scope and measure attacker reconnaissance activity.

Searched for successful responses (status: 200) after enumeration activity. Located access to sensitive admin directory content and identified the flag contained within the retrieved resource.


Filtered by attacker IP and Gobuster User-Agent to identify successful discovery results. Located the admin authentication endpoint discovered during enumeration.

Analyzed User-Agent values during repeated authentication attempts. The request pattern differed from enumeration activity and matched a brute-force authentication tool signature.

Filtered successful login attempts using HTTP method POST. Decoded the transmitted credential payload and identified the valid username and password combination used to gain access.


Reviewed successful file interaction events within the admin directory and extracted the flag value from the accessed resource.

After authentication success, filtered for command execution patterns. The attacker executed the whoami command (found by using search as this is as a popular command to discover role and privileges after intrusion) to verify execution context and privileges on the compromised host.
`
Found by filtering by HTTP response status 200 (could be searched searching by “../” pattern)
`
Filtered POST requests following credential discovery to locate administrative database access activity and identified the directory used to access the database management interface.
`
Searched for “sql” and identified the database name referenced in the export operation.
`
Filtered successful database modification requests and identified inserted content associated with the attacker’s persistence or proof-of-compromise flag.
`
`
This lab demonstrates practical blue-team investigation workflow:
The workflow mirrors a real SOC triage and incident investigation process.