<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search string in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-string/m-p/30477#M178034</link>
    <description>&lt;P&gt;This blog entry has details for you on how to address SQL injections with Splunk.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2010/02/04/sql-injections-the-splunk-method-for-auditing-your-application-security-model/"&gt;http://blogs.splunk.com/2010/02/04/sql-injections-the-splunk-method-for-auditing-your-application-security-model/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You may just want to search for web log events with a standard deviation of greater than the average like len(_raw) with greater than 2.5 Std deviation. &lt;/P&gt;

&lt;P&gt;Example using standard deviation here - &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/stats"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/stats&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hopefully somebody else can help with the cross sight scripting details and if that is possible to determine from within an IIS Log.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Apr 2012 21:05:10 GMT</pubDate>
    <dc:creator>sdaniels</dc:creator>
    <dc:date>2012-04-19T21:05:10Z</dc:date>
    <item>
      <title>Search string</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-string/m-p/30476#M178033</link>
      <description>&lt;P&gt;How do i search for Sql injection or XSS in IIS log. Can any body give me example too&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2012 13:00:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-string/m-p/30476#M178033</guid>
      <dc:creator>unso</dc:creator>
      <dc:date>2012-04-19T13:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Search string</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-string/m-p/30477#M178034</link>
      <description>&lt;P&gt;This blog entry has details for you on how to address SQL injections with Splunk.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2010/02/04/sql-injections-the-splunk-method-for-auditing-your-application-security-model/"&gt;http://blogs.splunk.com/2010/02/04/sql-injections-the-splunk-method-for-auditing-your-application-security-model/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You may just want to search for web log events with a standard deviation of greater than the average like len(_raw) with greater than 2.5 Std deviation. &lt;/P&gt;

&lt;P&gt;Example using standard deviation here - &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/stats"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/stats&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hopefully somebody else can help with the cross sight scripting details and if that is possible to determine from within an IIS Log.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2012 21:05:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-string/m-p/30477#M178034</guid>
      <dc:creator>sdaniels</dc:creator>
      <dc:date>2012-04-19T21:05:10Z</dc:date>
    </item>
  </channel>
</rss>

