<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: splunk wildcard search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667288#M228925</link>
    <description>&lt;P&gt;The dataset I am using is "Boss of the Sock Version 1" - "botsv1"&lt;/P&gt;&lt;P&gt;Index="botsv1"&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My assessment question is as follows:&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Use a "wild card" search to find all passwords used against the destination IP. As a hint, you will need to use a specific &lt;STRONG&gt;http_method=&lt;/STRONG&gt; as the attack was against a web server. You will also need to pipe the result into a search that uses the form_data field to search for user passwords within the &lt;STRONG&gt;form_data.&lt;/STRONG&gt; What is the SPL statement used?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Warning!&lt;BR /&gt;My SPL may be all over the place but here it is:&lt;BR /&gt;&lt;BR /&gt;Index="botsv1" dest_ip="192.168.250.70"&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;"http_method=POST form_data"*" source:"stream:http"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;| table form_data, src_ip, password&lt;BR /&gt;&lt;BR /&gt;I am very new here!&lt;BR /&gt;Your help is much appreciated&lt;/P&gt;</description>
    <pubDate>Fri, 03 Nov 2023 11:25:04 GMT</pubDate>
    <dc:creator>Mouseman123</dc:creator>
    <dc:date>2023-11-03T11:25:04Z</dc:date>
    <item>
      <title>splunk wildcard search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667260#M228907</link>
      <description>&lt;P&gt;I am very new to SPLUNK and practicing using the botsv1 index.&lt;/P&gt;&lt;P&gt;I need to use a "Wild Card" to find all the passwords used against a destination IP.&lt;/P&gt;&lt;P&gt;I know I need to use the&lt;STRONG&gt; http_method= Post&amp;nbsp;&lt;/STRONG&gt;and search for the user passwords within the &lt;STRONG&gt;form_data&lt;/STRONG&gt; field.&lt;/P&gt;&lt;P&gt;I have been experimenting with the SPL command but no success as of yet&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 07:50:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667260#M228907</guid>
      <dc:creator>Mouseman123</dc:creator>
      <dc:date>2023-11-03T07:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: splunk wildcard search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667274#M228914</link>
      <description>&lt;P&gt;Since everyone is not familiar with the data set you are referring to, please can you provide some examples of the events you are trying to find. Also, please share the SPL you have already tried, so we can see where you might be going wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 09:49:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667274#M228914</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-03T09:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: splunk wildcard search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667288#M228925</link>
      <description>&lt;P&gt;The dataset I am using is "Boss of the Sock Version 1" - "botsv1"&lt;/P&gt;&lt;P&gt;Index="botsv1"&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My assessment question is as follows:&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Use a "wild card" search to find all passwords used against the destination IP. As a hint, you will need to use a specific &lt;STRONG&gt;http_method=&lt;/STRONG&gt; as the attack was against a web server. You will also need to pipe the result into a search that uses the form_data field to search for user passwords within the &lt;STRONG&gt;form_data.&lt;/STRONG&gt; What is the SPL statement used?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Warning!&lt;BR /&gt;My SPL may be all over the place but here it is:&lt;BR /&gt;&lt;BR /&gt;Index="botsv1" dest_ip="192.168.250.70"&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;"http_method=POST form_data"*" source:"stream:http"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;| table form_data, src_ip, password&lt;BR /&gt;&lt;BR /&gt;I am very new here!&lt;BR /&gt;Your help is much appreciated&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 11:25:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667288#M228925</guid>
      <dc:creator>Mouseman123</dc:creator>
      <dc:date>2023-11-03T11:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: splunk wildcard search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667289#M228926</link>
      <description>&lt;P&gt;So, what events are returned from the first part of your search with http_method="POST"?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 11:47:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/667289#M228926</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-03T11:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: splunk wildcard search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/669694#M229632</link>
      <description>&lt;P&gt;Sorry,&lt;/P&gt;&lt;P&gt;I assumed the dataset "botsV1" was very widely known.&lt;/P&gt;&lt;P&gt;Thankyou for responding to my question however I have been able to solve the issue.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 02:10:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-wildcard-search/m-p/669694#M229632</guid>
      <dc:creator>Mouseman123</dc:creator>
      <dc:date>2023-11-25T02:10:51Z</dc:date>
    </item>
  </channel>
</rss>

