<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: splunk in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689666#M19522</link>
    <description>&lt;P&gt;The search you have posted is not valid - please share the actual search with minimal anonymisation. Please share in a code block &amp;lt;/&amp;gt; to preserve spacing etc.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jun 2024 08:21:02 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2024-06-05T08:21:02Z</dc:date>
    <item>
      <title>splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689649#M19519</link>
      <description>&lt;P&gt;hello i have installed DVWA in my xamp server . practiced some Sql attack on DVWA . after that i typed&amp;nbsp; the following in Splunk search bar&amp;nbsp; &amp;nbsp;but its showing any result .&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=dvwa_logs (error OR "SQL Injection" OR "SQL Error" OR "SQL syntax") OR (sourcetype=access_combined status=200 AND (search_field="*' OR 1=1 --" OR search_field="admin' OR '1'='1")) | stats count by source_ip, search_field, host&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 06:43:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689649#M19519</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T06:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689653#M19520</link>
      <description>&lt;P&gt;What is your question? (Subject "splunk" doesn't help narrow it down given that this is a community of Splunk users answering questions about Splunk-related issues!)&lt;/P&gt;&lt;P&gt;Please provide a description of what you are trying to achieve, some anonymised representative sample events, your current results from searches you have tried, and what your expected results would look like (with a description of the logic relating the sample events to the expected output, if appropriate).&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 07:09:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689653#M19520</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-06-05T07:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689655#M19521</link>
      <description>&lt;P&gt;i have installed DVWA over a xampp . done some cross site scripting now i want to detect that malicious activity in my splunk enterprise&lt;/P&gt;&lt;P&gt;iput the following command&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="dvwa_logs" host="DESKTOP-OKV6K44" sourcetype="access_combined" ("' or 1=1; --" OR "admin' OR '1'='1") | stats count by source_ip, uri, _time&lt;/P&gt;&lt;P&gt;but not getting ant result&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 07:22:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689655#M19521</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T07:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689666#M19522</link>
      <description>&lt;P&gt;The search you have posted is not valid - please share the actual search with minimal anonymisation. Please share in a code block &amp;lt;/&amp;gt; to preserve spacing etc.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 08:21:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689666#M19522</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-06-05T08:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689670#M19524</link>
      <description>&lt;P&gt;i am a newbie please help me to correct my code . tried to correct that with chatgpt. it said the code is ok&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 09:07:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689670#M19524</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T09:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689671#M19525</link>
      <description>&lt;P&gt;here is the fresh code&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index="dvwa_logs" host="DESKTOP-OKV6K44" sourcetype="access_combined"
(" ' or 1=1; -- " OR " admin' OR '1'='1 ")
| stats count by source_ip, uri, _time&lt;/LI-CODE&gt;
&lt;P&gt;still not working&lt;/P&gt;
&lt;P&gt;i have injected&amp;nbsp;&lt;/P&gt;
&lt;P&gt;' or 1=1; --&lt;/P&gt;
&lt;P&gt;this in the input field&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 10:03:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689671#M19525</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T10:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689675#M19526</link>
      <description>&lt;P&gt;OK That's funny! ChatGPT! No wonder you still have issues!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 09:48:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689675#M19526</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-06-05T09:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689676#M19527</link>
      <description>&lt;P&gt;What is it you are trying to do? What is the "&lt;SPAN&gt;' or 1=1; --" supposed to be doing? Please share some anonymised representative events so we can see what you are dealing with (amazingly, we don't have access to your systems or your data!)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 09:50:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689676#M19527</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-06-05T09:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689691#M19530</link>
      <description>&lt;P&gt;i have installed a vulnerable web application in my win 10 OS through xampp. now i have setup my splunk enterprise to test the effect of various attack on the target DVWA web application .&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;or 1=1; -- this is a&amp;nbsp;&lt;/SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sql  injection attack" style="width: 908px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/31158iA864717594EA7004/image-size/large?v=v2&amp;amp;px=999" role="button" title="sql injection atack.PNG" alt="Sql  injection attack" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Sql  injection attack&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 11:21:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689691#M19530</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T11:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689694#M19531</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;the following code 1'&lt;/SPAN&gt;&lt;SPAN&gt; OR &lt;/SPAN&gt;&lt;SPAN class=""&gt;'1'&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN class=""&gt;'1'&lt;/SPAN&gt;&lt;SPAN class=""&gt;# these are the malicious code to get admin data and password. i want to find the anomaly that it causes the log through Splunk search&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sample attack" style="width: 900px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/31160iAD9A2D2E4DF7F2C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="sql injection attack 2.PNG" alt="sample attack" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;sample attack&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 11:30:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689694#M19531</guid>
      <dc:creator>Ahmed_340</dc:creator>
      <dc:date>2024-06-05T11:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689697#M19532</link>
      <description>&lt;P&gt;If you know when you injected it, can you find the raw event in the logs that Splunk has to see how it has been logged (then you'll know what to search for)?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 11:35:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/splunk/m-p/689697#M19532</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-06-05T11:35:51Z</dc:date>
    </item>
  </channel>
</rss>

