<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286876#M86828</link>
    <description>&lt;P&gt;Dear Experts,&lt;/P&gt;

&lt;P&gt;Kindly help to create a search for 5 failed logins followed by 1 successful login from one user.   &lt;/P&gt;

&lt;P&gt;Interesting fields = user(Username) , action(Success Or Failed)  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* | ....
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks in advanced &lt;/P&gt;</description>
    <pubDate>Mon, 21 Dec 2015 21:37:33 GMT</pubDate>
    <dc:creator>sumit29</dc:creator>
    <dc:date>2015-12-21T21:37:33Z</dc:date>
    <item>
      <title>How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286876#M86828</link>
      <description>&lt;P&gt;Dear Experts,&lt;/P&gt;

&lt;P&gt;Kindly help to create a search for 5 failed logins followed by 1 successful login from one user.   &lt;/P&gt;

&lt;P&gt;Interesting fields = user(Username) , action(Success Or Failed)  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* | ....
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks in advanced &lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2015 21:37:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286876#M86828</guid>
      <dc:creator>sumit29</dc:creator>
      <dc:date>2015-12-21T21:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286877#M86829</link>
      <description>&lt;P&gt;Hi sumit29,&lt;/P&gt;

&lt;P&gt;Can you try the following?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* | stats list(Action) as Attempts, count(eval(match(Action,"Failed"))) as Failed, count(eval(match(Action,"Success"))) as Success by Username | where mvcount(Attempts)&amp;gt;=6 AND Success=1 AND Failed&amp;gt;=5
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 21 Dec 2015 23:37:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286877#M86829</guid>
      <dc:creator>Murali2888</dc:creator>
      <dc:date>2015-12-21T23:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286878#M86830</link>
      <description>&lt;P&gt;In case, you are using the &lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;Common Information Model&lt;/A&gt;, then you can start your search as &lt;CODE&gt;tag=Authentication&lt;/CODE&gt;. This will invoke the data from across all "relevant" indexes and will be much faster in returning results.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 04:11:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286878#M86830</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2015-12-22T04:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286879#M86831</link>
      <description>&lt;P&gt;Thanks. That works.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 19:03:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286879#M86831</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2016-08-31T19:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286880#M86832</link>
      <description>&lt;P&gt;HI Murali,&lt;/P&gt;

&lt;P&gt;What if there would be multiple success events after 5 failed attempts?  if that happens , success always will be greater than 1 then search returns 0 results. how to deal with this situation?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2017 07:58:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286880#M86832</guid>
      <dc:creator>thambisetty_bal</dc:creator>
      <dc:date>2017-01-16T07:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286881#M86833</link>
      <description>&lt;P&gt;That does seem to work, but it doesn't take the time sequence in consideration , how can I order the events in order of time? I first want to see 5 failed loggings followed by a successful login,  and not 6 total loggings where there is a successful login in between somewhere&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 06:01:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286881#M86833</guid>
      <dc:creator>erdalcan</dc:creator>
      <dc:date>2017-05-09T06:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286882#M86834</link>
      <description>&lt;P&gt;In how many mins, do you want to see the failed login followed by successful logon? if you schedule the above search within that time frame, it should help in you in what you need. Alternatively, you could also use streamstats to get the running total for a given period.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 09:09:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286882#M86834</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2017-05-17T09:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for 5 failed logins followed by 1 successful login from one user to find brute force attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286883#M86835</link>
      <description>&lt;P&gt;I have already added a time field (10 minutes), but it seems this query searches in the given timeframe and looks for the total failed and one successful event, without taking the time sequence in which order they came.&lt;BR /&gt;
for example, I run the query and see users who have logged in this sequence:&lt;BR /&gt;
1. failure&lt;BR /&gt;
2. success&lt;BR /&gt;
3. failure&lt;BR /&gt;
4. failure&lt;BR /&gt;
5. failure&lt;BR /&gt;
6. failure&lt;/P&gt;

&lt;P&gt;The query should only look for the first 5 failed loggings followed by a successful, but&lt;BR /&gt;
it looks in total of loggings within a timeframe&lt;/P&gt;

&lt;P&gt;wonder if this is easy to do with the enterprise security app, there you do have brute force queries but none of them contain the successful brute force attacks&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 09:47:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-5-failed-logins-followed-by-1-successful-login/m-p/286883#M86835</guid>
      <dc:creator>erdalcan</dc:creator>
      <dc:date>2017-05-17T09:47:56Z</dc:date>
    </item>
  </channel>
</rss>

