I built this lab to simulate how a Blue Team can detect a credential dumping attack using Sysmon and Splunk.
I ran a real Mimikatz attack inside a Windows 10 VM and created a Splunk alert to catch it.
I created a clean Windows 10 VM on VirtualBox.
(Optional initial setup screenshot)
privilege::debug
sekurlsa::logonpasswords
I also saved the Splunk detection rule as a file so it can be reused:
detection-rule.spl
Alert Configuration
Alert Triggered in Splunk