Hi All,
We are basically forwarding the cloudflare firewall events to Splunk, we have enabled "payload logging" to view what payload was send by the user.
Unfortunately the payload data which is forward to splunk is encrypted and we are not sure what tool to use to decrypt it.
We do hold this private keys with us, but how to decrypt that in the splunk search is the question.
We tried installing DECRYPT2 APP on Splunk but that is also of no help.
Has anyone come across this type of issues and how have they fixed it. Request someone to suggest how to proceed with this.
@isoutamo sorry for the late response.
I am not sure on that part, I guess they use this - "hybrid public key Encryption". I did install Decrypt2 on Splunk but not sure how that works.
This is how it works with b64 encoding
index=_internal
| head 1
| decrypt field=splunk_server btoa()
| eval foo=decrypted
| decrypt field=foo b64()
| table splunk_server foo decrypted
You must remember that it use field decrypted as output and it didn't change the original field.
Here is what functions it support https://splunkbase.splunk.com/app/5565 (Tab Details).
Hi
how that field has encrypted? Base64 or some other method?
I have used decrypt2 earlier without any issues with this kind of data. If I recall right it creates another field where it decrypt this field? It leave original field encrypted.
r. Ismo