<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Correlation Search for brute force in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683925#M233502</link>
    <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;I need to upgrade my correlation search for&amp;nbsp;Excessive Failed Logins with Username,&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=true values("Authentication.tag") as "tag",dc("Authentication.user") as "user_count",values("Authentication.user") as "usernames", dc("Authentication.dest") as "dest_count",count from datamodel="Authentication"."Authentication" where nodename="Authentication.Failed_Authentication" by "Authentication.app","Authentication.src" | rename "Authentication.app" as "app","Authentication.src" as "src"  | where 'count'&amp;gt;=6&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;I would like the query to trigger only when there is a Successful Authentication after 6 failed authentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thank youu&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Apr 2024 17:33:40 GMT</pubDate>
    <dc:creator>toporagno</dc:creator>
    <dc:date>2024-04-11T17:33:40Z</dc:date>
    <item>
      <title>Correlation Search for brute force</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683925#M233502</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;I need to upgrade my correlation search for&amp;nbsp;Excessive Failed Logins with Username,&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=true values("Authentication.tag") as "tag",dc("Authentication.user") as "user_count",values("Authentication.user") as "usernames", dc("Authentication.dest") as "dest_count",count from datamodel="Authentication"."Authentication" where nodename="Authentication.Failed_Authentication" by "Authentication.app","Authentication.src" | rename "Authentication.app" as "app","Authentication.src" as "src"  | where 'count'&amp;gt;=6&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;I would like the query to trigger only when there is a Successful Authentication after 6 failed authentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thank youu&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 17:33:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683925#M233502</guid>
      <dc:creator>toporagno</dc:creator>
      <dc:date>2024-04-11T17:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Search for brute force</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683955#M233506</link>
      <description>&lt;P&gt;The current query can't do that because it only looks at failed logins.&amp;nbsp; It will never see a successful login.&lt;/P&gt;&lt;P&gt;The solution will entail appending a &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; command that counts successes and then modifying the &lt;FONT face="courier new,courier"&gt;where&lt;/FONT&gt; command to look for 6 or more failures and at least 1 success.&lt;/P&gt;&lt;P&gt;You can find an example in the Basic Brute Force Detection use case in the Splunk Security Essentials apps.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 18:29:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683955#M233506</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-04-11T18:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Search for brute force</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683996#M233515</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/264035"&gt;@toporagno&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;said, in Security Essentials App and in ES Content Updates App, there are many samples of the brute force attack followed by a saccessful login, anyway, you could ttry something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=true 
   count(eval(Authentication.action="success")) AS success_count 
   count(eval(Authentication.action="failure")) AS failure_count 
   FROM datamodel=Authentication 
   WHERE Authentication.action IN (success, failure)
   BY Authentication.user
| rename 
   Authentication.user AS user
| where failure_count&amp;gt;=6 AND success_count&amp;gt;=6&lt;/LI-CODE&gt;&lt;P&gt;That you can adapt to your data.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 06:15:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/683996#M233515</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-04-12T06:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation Search for brute force</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/684012#M233516</link>
      <description>&lt;P&gt;Apart from all the valid remarks from &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; and &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt; , think about what you need. If you want to build on the search shown by &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; notice that yours groups login attempts by source (which means that it will show multiple attempts to log in using different usernames but from the same IP as one result) whereas the other one groups by username which means that it will aggregate login attempts to the same account launched from different IPs but split different account login attempts from the same IP as separate results. So it's a question of what you are looking for.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:45:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlation-Search-for-brute-force/m-p/684012#M233516</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-04-12T08:45:39Z</dc:date>
    </item>
  </channel>
</rss>

