<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input in Security</title>
    <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432705#M13186</link>
    <description>&lt;P&gt;What about this as a regex :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  (?&amp;lt;ip&amp;gt;^\d{1,3}.\d{1,3}\.\d{1,3}.\d{1,3})\|(?&amp;lt;name&amp;gt;\w+)\|(?&amp;lt;directoryPort&amp;gt;\d+)\|(?&amp;lt;routerPort&amp;gt;\d+)\|(?&amp;lt;flags&amp;gt;\w+)\|(?&amp;lt;uptime&amp;gt;\d+)\|(?&amp;lt;version&amp;gt;\w+\s+\S+)\|(?&amp;lt;description&amp;gt;[a-zA-Z&amp;amp;]\w.+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is it giving you anything ?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jun 2019 19:23:00 GMT</pubDate>
    <dc:creator>DavidHourani</dc:creator>
    <dc:date>2019-06-18T19:23:00Z</dc:date>
    <item>
      <title>Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432702#M13183</link>
      <description>&lt;P&gt;We have a Tor threat intelligence feed that we require to add to Splunk Enterprise.&lt;/P&gt;

&lt;P&gt;The intelligence feed is from dan . me . uk / tornodes&lt;/P&gt;

&lt;P&gt;The format of the page is typically html followed by a starting tag _&lt;EM&gt;BEGIN_TOR_NODE_LIST&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Does Splunk Enterprise Threat Intelligence download feeds support a HTML type of input ?&lt;/P&gt;

&lt;P&gt;TOR Node List&lt;/P&gt;

&lt;P&gt;This page contains a full TOR nodelist (updated at Mon Jun 17 19:31:39 BST 2019) in the format below.&lt;BR /&gt;
There are tags of BEGIN_TOR_NODE_LIST and END_TOR_NODE_LIST for easy scripting use of this page.&lt;/P&gt;

&lt;P&gt;You can also fetch &lt;A href="https://www.dan.me.uk/torlist/" target="_blank"&gt;https://www.dan.me.uk/torlist/&lt;/A&gt; (FULL) or &lt;A href="https://www.dan.me.uk/torlist/?exit" target="_blank"&gt;https://www.dan.me.uk/torlist/?exit&lt;/A&gt; (EXIT only) for a list of ips only, one per line - updated every 30 minutes. Ideal for constructing your own tor banlists.&lt;/P&gt;

&lt;P&gt;NOTE: This is a FULL list including more than just exit nodes. If you only wish to block exit nodes you NEED to process the list to include only flags E and/or X!&lt;BR /&gt;
You WILL upset people if you block the full list as many nodes do not permit exit.&lt;/P&gt;

&lt;P&gt;|||||||&lt;BR /&gt;
Total number of nodes is: 7680&lt;/P&gt;

&lt;P&gt;192.2.1.200|hidden|9001|0|RV|64883|Tor 0.3.5.8|&lt;BR /&gt;
192.0.1.168|hidden2|80|0|EFRDV|195782|Tor 0.3.5.7|decsription goes here&lt;/P&gt;

&lt;P&gt;Internal IP's given for privacy reasons&lt;/P&gt;

&lt;P&gt;Trying to use regular expressions to extract the fields fails&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?&amp;lt;ip&amp;gt;^\d{1,3}.\d{1,3}\.\d{1,3}.\d{1,3})\|(?&amp;lt;name&amp;gt;\w+)\|(?&amp;lt;directoryPort&amp;gt;\d+)\|(?&amp;lt;routerPort&amp;gt;\d+)\|(?&amp;lt;flags&amp;gt;\w+)\|(?&amp;lt;uptime&amp;gt;\d+)\|(?&amp;lt;version&amp;gt;\w+\s+\S+)\|(?&amp;lt;contactInfo&amp;gt;[a-zA-Z&amp;amp;]\w+.*)?\&amp;lt;br\s+\/\&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've tried stating the number of lines to skip on the page and tried changing delimiter but it still comes back with parsing failure in the threat management log.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:59:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432702#M13183</guid>
      <dc:creator>splunkmachine</dc:creator>
      <dc:date>2020-09-30T00:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432703#M13184</link>
      <description>&lt;P&gt;Hi @splunkmachine,&lt;/P&gt;

&lt;P&gt;Yes sir you can !&lt;/P&gt;

&lt;P&gt;Here's the guide on how to add a webpage as a threat intel source for ES :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Downloadthreatfeed#Add_a_URL-based_threat_source"&gt;https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Downloadthreatfeed#Add_a_URL-based_threat_source&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Let me know if you're stuck somewhere when walking through it.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 08:43:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432703#M13184</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-06-18T08:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432704#M13185</link>
      <description>&lt;P&gt;Hi David&lt;/P&gt;

&lt;P&gt;I've added quite a few URL based intelligence feeds which are typically a web page of IP's however, as my original post yes I'm stuck as I get parsing errors.&lt;/P&gt;

&lt;P&gt;I've followed the instructions.&lt;BR /&gt;
Here's the guide on how to add a webpage as a threat intel source for ES :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Downloadthreatfeed#Add_a_URL-based_threat_source"&gt;https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Downloadthreatfeed#Add_a_URL-based_threat_source&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I've tried the following to extract the fields.&lt;BR /&gt;
(?^\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})|(?\w+)|(?\d+)|(?\d+)|(?\w+)|(?\d+)|(?\w+\s+\S+)|(?[a-zA-Z&amp;amp;]\w+.*)?\&lt;/P&gt;

&lt;P&gt;And listed the fields &lt;/P&gt;

&lt;P&gt;I've tried using regular expressions to extract the fields, I've also tried to use a separator.&lt;BR /&gt;
The download feed consists of 8 fields seperated by '|' symbol which start at line 155 in the web page.&lt;BR /&gt;
The web page consists of html and each line consisting of the six fields has the following html&lt;BR /&gt;
'&lt;BR /&gt;&lt;/P&gt;

&lt;P&gt;The fields are:&lt;BR /&gt;
|||||||&lt;/P&gt;

&lt;P&gt;Eight field is optional.&lt;/P&gt;

&lt;P&gt;I've tested listing the fields in the notation as documented:&lt;BR /&gt;
:$,.$&lt;BR /&gt;
ip:$1,description:domain_blocklist&lt;/P&gt;

&lt;P&gt;Checking the threat management log I see parsing failure.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 19:02:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432704#M13185</guid>
      <dc:creator>splunkmachine</dc:creator>
      <dc:date>2019-06-18T19:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432705#M13186</link>
      <description>&lt;P&gt;What about this as a regex :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  (?&amp;lt;ip&amp;gt;^\d{1,3}.\d{1,3}\.\d{1,3}.\d{1,3})\|(?&amp;lt;name&amp;gt;\w+)\|(?&amp;lt;directoryPort&amp;gt;\d+)\|(?&amp;lt;routerPort&amp;gt;\d+)\|(?&amp;lt;flags&amp;gt;\w+)\|(?&amp;lt;uptime&amp;gt;\d+)\|(?&amp;lt;version&amp;gt;\w+\s+\S+)\|(?&amp;lt;description&amp;gt;[a-zA-Z&amp;amp;]\w.+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is it giving you anything ?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 19:23:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432705#M13186</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-06-18T19:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432706#M13187</link>
      <description>&lt;P&gt;Hi David&lt;/P&gt;

&lt;P&gt;I tried your suggestion above which I tried also originally still parsing errors.&lt;/P&gt;

&lt;P&gt;I went back to my originally &lt;BR /&gt;
regex: (?^\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})|(?\w+)|(?\d+)|(?\d+)|(?\w+)|(?\d+)|(?\w+\s+\S+)|(?[a-zA-Z&amp;amp;]\w+.*)?\&lt;/P&gt;

&lt;P&gt;and removed delimiter this time setting fields&lt;BR /&gt;
to ip:$1, description:"DAN_TOR-$3-$4-$5"&lt;/P&gt;

&lt;P&gt;This worked!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 20:48:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432706#M13187</guid>
      <dc:creator>splunkmachine</dc:creator>
      <dc:date>2019-06-19T20:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: Does Enterprise Security Threat Intelligence download feeds  support normal web page input</title>
      <link>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432707#M13188</link>
      <description>&lt;P&gt;Is there any chance you could post the full configurations for this?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2019 20:40:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Enterprise-Security-Threat-Intelligence-download-feeds/m-p/432707#M13188</guid>
      <dc:creator>gbeatty</dc:creator>
      <dc:date>2019-09-03T20:40:15Z</dc:date>
    </item>
  </channel>
</rss>

