<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to write a query to detect Brute-force attack from Linux machines and ForgeRock authentication in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-write-a-query-to-detect-Brute-force-attack-from-Linux/m-p/510184#M2731</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185959"&gt;@phanichintha&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as you did for Windows (&lt;STRONG&gt;index="main" (EventCode=4624 OR EventCode=4625) Account_Name="*" NOT Account_Name="-")&lt;/STRONG&gt;, you have to find an eventtype for Linux and ForgeRock.&lt;/P&gt;&lt;P&gt;For Linux, you could use these eventtypes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Linux_Audit]
search = index=os sourcetype=linux_secure NOT disconnect

[Linux_Logfail]
search = eventtype=Linux_Audit "failed password"

[Linux_Login]
search = eventtype=Linux_Audit "accepted password"

[Linux_Logout]
search = eventtype=Linux_Audit "session closed"&lt;/LI-CODE&gt;&lt;P&gt;For ForgeRock I cannot help you because I don't know it, but you can follow my approach.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2020 08:51:00 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-07-21T08:51:00Z</dc:date>
    <item>
      <title>How to write a query to detect Brute-force attack from Linux machines and ForgeRock authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-write-a-query-to-detect-Brute-force-attack-from-Linux/m-p/510169#M2729</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I wrote a query for windows AD to&amp;nbsp;detect Brute-force attack&lt;BR /&gt;&lt;STRONG&gt;index="main" (EventCode=4624 OR EventCode=4625) Account_Name="*" NOT Account_Name="-"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| stats count(Keywords) as Attempts, count(eval(match(Keywords,"Audit Failure"))) as Failed,&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;count(eval(match(Keywords,"Audit Success"))) as Success&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;earliest(_time) as FirstAttempt latest(_time) as LatestAttempt by Account_Name&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| where Attempts&amp;gt;=5 AND Failed&amp;gt;=5 AND Success&amp;gt;0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| eval FirstAttempt=strftime(FirstAttempt,"%x %X") &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| eval LatestAttempt=strftime(LatestAttempt,"%x %X")&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So same like this can anyone share the exact query for two scenarios.&lt;BR /&gt;1. Linux machines&lt;BR /&gt;2. ForgeRock authentication&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 06:29:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-write-a-query-to-detect-Brute-force-attack-from-Linux/m-p/510169#M2729</guid>
      <dc:creator>phanichintha</dc:creator>
      <dc:date>2020-07-21T06:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to write a query to detect Brute-force attack from Linux machines and ForgeRock authentication</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-write-a-query-to-detect-Brute-force-attack-from-Linux/m-p/510184#M2731</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185959"&gt;@phanichintha&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as you did for Windows (&lt;STRONG&gt;index="main" (EventCode=4624 OR EventCode=4625) Account_Name="*" NOT Account_Name="-")&lt;/STRONG&gt;, you have to find an eventtype for Linux and ForgeRock.&lt;/P&gt;&lt;P&gt;For Linux, you could use these eventtypes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Linux_Audit]
search = index=os sourcetype=linux_secure NOT disconnect

[Linux_Logfail]
search = eventtype=Linux_Audit "failed password"

[Linux_Login]
search = eventtype=Linux_Audit "accepted password"

[Linux_Logout]
search = eventtype=Linux_Audit "session closed"&lt;/LI-CODE&gt;&lt;P&gt;For ForgeRock I cannot help you because I don't know it, but you can follow my approach.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 08:51:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-write-a-query-to-detect-Brute-force-attack-from-Linux/m-p/510184#M2731</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-07-21T08:51:00Z</dc:date>
    </item>
  </channel>
</rss>

