Splunk Enterprise

splunk

Ahmed_340
Loves-to-Learn

hello i have installed DVWA in my xamp server . practiced some Sql attack on DVWA . after that i typed  the following in Splunk search bar   but its showing any result . 

index=dvwa_logs (error OR "SQL Injection" OR "SQL Error" OR "SQL syntax") OR (sourcetype=access_combined status=200 AND (search_field="*' OR 1=1 --" OR search_field="admin' OR '1'='1")) | stats count by source_ip, search_field, host

Labels (1)
0 Karma

Ahmed_340
Loves-to-Learn

i have installed DVWA over a xampp . done some cross site scripting now i want to detect that malicious activity in my splunk enterprise

iput the following command 

index="dvwa_logs" host="DESKTOP-OKV6K44" sourcetype="access_combined" ("' or 1=1; --" OR "admin' OR '1'='1") | stats count by source_ip, uri, _time

but not getting ant result

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

The search you have posted is not valid - please share the actual search with minimal anonymisation. Please share in a code block </> to preserve spacing etc.

0 Karma

Ahmed_340
Loves-to-Learn

here is the fresh code

 

index="dvwa_logs" host="DESKTOP-OKV6K44" sourcetype="access_combined"
(" ' or 1=1; -- " OR " admin' OR '1'='1 ")
| stats count by source_ip, uri, _time

still not working

i have injected 

' or 1=1; --

this in the input field

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What is it you are trying to do? What is the "' or 1=1; --" supposed to be doing? Please share some anonymised representative events so we can see what you are dealing with (amazingly, we don't have access to your systems or your data!)

0 Karma

Ahmed_340
Loves-to-Learn

the following code 1' OR '1'='1'# these are the malicious code to get admin data and password. i want to find the anomaly that it causes the log through Splunk searchsample attacksample attack

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

If you know when you injected it, can you find the raw event in the logs that Splunk has to see how it has been logged (then you'll know what to search for)?

0 Karma

Ahmed_340
Loves-to-Learn

i have installed a vulnerable web application in my win 10 OS through xampp. now i have setup my splunk enterprise to test the effect of various attack on the target DVWA web application .  or 1=1; -- this is a Sql  injection attackSql injection attack

0 Karma

Ahmed_340
Loves-to-Learn

i am a newbie please help me to correct my code . tried to correct that with chatgpt. it said the code is ok

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

OK That's funny! ChatGPT! No wonder you still have issues! 🤣

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What is your question? (Subject "splunk" doesn't help narrow it down given that this is a community of Splunk users answering questions about Splunk-related issues!)

Please provide a description of what you are trying to achieve, some anonymised representative sample events, your current results from searches you have tried, and what your expected results would look like (with a description of the logic relating the sample events to the expected output, if appropriate).

0 Karma
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL  The Splunk AI Assistant for SPL ...

Buttercup Games: Further Dashboarding Techniques (Part 5)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Customers Increasingly Choose Splunk for Observability

For the second year in a row, Splunk was recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for ...