I built this lab to simulate how a Blue Team can detect a credential dumping attack using Sysmon and Splunk.
I ran a real Mimikatz attack inside a Windows 10 VM and created a Splunk alert to catch it.
I created a clean Windows 10 VM on VirtualBox.

(Optional initial setup screenshot)




privilege::debug
sekurlsa::logonpasswords
I also saved the Splunk detection rule as a file so it can be reused:
detection-rule.spl
Alert Configuration

Alert Triggered in Splunk
