Splunk Search

RDP Session Daisy Chain

srakiec
New Member

Hello,

I am trying to form a script that will parse information to detect RDP sessions that are Daisy Chained over our network.

Example:

src=* dest=* dest_port=3389 | transaction dest startswith=(src)

src=w.x.y.z. dest=1.2.3.4 dest_port-3389
scr=1.2.3.4 dest=a.b.c.d dest_port=3389

The problem is continuing the search to find multiple jumps and listing the multiple IPS.

0 Karma

micahkemp
Champion

You need duration or end time in addition to start time to consider doing this.

It's also going to be difficult to do this in a "normal" Splunk search. I did something somewhat similar with mail logs. Specifically I had to write a custom search command that followed tree-like data, which is what your use case really needs.

0 Karma
Get Updates on the Splunk Community!

What’s New in Splunk Enterprise 9.4: Tools for Digital Resilience

PLATFORM TECH TALKS What’s New in Splunk Enterprise 9.4: Tools for Digital Resilience Thursday, February 27, ...

Leverage Cisco Talos Threat Intelligence Across Splunk Security Products

Leverage Cisco Talos Threat Intelligence Across Splunk Security Products Wednesday, February 26, ...

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...