<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Datasets: Bruteforce and internal scanning in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498899#M8976</link>
    <description>&lt;P&gt;I tried to find some specific datasets for scan attacks and brute force, maybe some of the following will help you.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.unb.ca/cic/datasets/ids-2017.html"&gt;https://www.unb.ca/cic/datasets/ids-2017.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://www.secrepo.com/"&gt;https://www.secrepo.com/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;There is also some datasets from Splunk Boss of the SOC ctf, which contains a lot of security related logs:&lt;BR /&gt;
&lt;A href="https://github.com/splunk/botsv1"&gt;https://github.com/splunk/botsv1&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://github.com/splunk/botsv2"&gt;https://github.com/splunk/botsv2&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;If you want or need to generate real-time events you can try the Eventgen app:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1924/"&gt;https://splunkbase.splunk.com/app/1924/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also, I would suggest you to try generating your own datasets, since some of those logs are not hard to get, as an example, Windows authentication events can be collected directly from your workstation, and to use the query in the video a small amount of logs would be enough.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2019 23:56:12 GMT</pubDate>
    <dc:creator>alonsocaio</dc:creator>
    <dc:date>2019-11-28T23:56:12Z</dc:date>
    <item>
      <title>Datasets: Bruteforce and internal scanning</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498898#M8975</link>
      <description>&lt;P&gt;Hi I'm very new to splunk and would like to setup a demo and show how brute force attacks and internal network scanning is being detected by splunk. &lt;/P&gt;

&lt;P&gt;I will use this tutorial: &lt;A href="https://www.youtube.com/watch?v=x78lcsWPPW8"&gt;https://www.youtube.com/watch?v=x78lcsWPPW8&lt;/A&gt; and &lt;/P&gt;

&lt;P&gt;I'm looking for one dataset of a brute force attack and one dataset of internal network scanning, I want to import those datasets.&lt;BR /&gt;
(Not live data)&lt;/P&gt;

&lt;P&gt;Where can I find such datasets?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 15:04:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498898#M8975</guid>
      <dc:creator>bouncingbubble</dc:creator>
      <dc:date>2019-11-28T15:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Datasets: Bruteforce and internal scanning</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498899#M8976</link>
      <description>&lt;P&gt;I tried to find some specific datasets for scan attacks and brute force, maybe some of the following will help you.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.unb.ca/cic/datasets/ids-2017.html"&gt;https://www.unb.ca/cic/datasets/ids-2017.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://www.secrepo.com/"&gt;https://www.secrepo.com/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;There is also some datasets from Splunk Boss of the SOC ctf, which contains a lot of security related logs:&lt;BR /&gt;
&lt;A href="https://github.com/splunk/botsv1"&gt;https://github.com/splunk/botsv1&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://github.com/splunk/botsv2"&gt;https://github.com/splunk/botsv2&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;If you want or need to generate real-time events you can try the Eventgen app:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1924/"&gt;https://splunkbase.splunk.com/app/1924/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also, I would suggest you to try generating your own datasets, since some of those logs are not hard to get, as an example, Windows authentication events can be collected directly from your workstation, and to use the query in the video a small amount of logs would be enough.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 23:56:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498899#M8976</guid>
      <dc:creator>alonsocaio</dc:creator>
      <dc:date>2019-11-28T23:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Datasets: Bruteforce and internal scanning</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498900#M8977</link>
      <description>&lt;P&gt;Please tell me what you did later.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 12:36:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Datasets-Bruteforce-and-internal-scanning/m-p/498900#M8977</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-11-29T12:36:22Z</dc:date>
    </item>
  </channel>
</rss>

