This document discusses how Splunk can be used to analyze log data to investigate a hacking incident. The analysis identified that:
1) A defacement page was uploaded to the site disguised as an activity.php file.
2) The defacement page returned a static response size, while the original file size varied.
3) The first request returning the static size was used to identify the attacker's IP address.
4) Further analysis revealed the actual vulnerability and that the defacer's IP differed from the initial exploit IP.