#tryhackmeaoc2024
# Log Analysis with Splunk!
I've already done half of the room, but wanted to have some pictures to refer to.
### CCTV Feed by UserName


### CCTV Feed by Event Type


### CCTV Feed by Rare Event


### CCTV Failed Feeds, sorted by username with session_id's


Even though the users are the same, it's all originating from the same `session_id`. Let's search that `session_id` specifically!


It looks like he was trying to login, was failing, and finally succeeded. Then they proceeded to Watch and Delete Recordings. Let's see which ones he accessed.


We can take the `DeleteRecording` `session_id` and search that! Let's do that now.

If we check the `clientip` field within these results, we can see that there is only one IP!

## Searching through what the IP has done

We can see there are a LOT of events (~600), and that the `session_id` is completely different! Let's go back and search through that id.

### Finding out who was doing these actions:


It was Mayor Malware all along! And his `user_id` is 4.
We are done :)
