• Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs
  • Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs

Members

Profile picture of DaveyBoy

DaveyBoy

@daveyboy Active 5 years, 3 months ago
  • Activity
  • Profile
  • Posts
  • Personal
  • Mentions
  • Favorites
  • Profile picture of DaveyBoy
    5 years, 6 months ago

    DaveyBoy wrote a new post

    Dashboard with 3 separate columns which allow you to drill into 3 separate assets to find out who was logged on, when they logged on, and how they logged on. Accounts for remote logins, local logins, and […]

    • Profile picture of Armando Dsouga
      Armando Dsouga replied 5 years, 4 months ago

      Hi, I’m new to splunk… Doesn’t seem to work for me.. not sure what input values i need to place in it?

      • Profile picture of SplunkNinja
        SplunkNinja replied 5 years, 4 months ago

        Armando,
        You’ll need to have access to the correct indexes for this, you might need to manually enter the index name if your role doesn’t search all non-internal indexes by default.

    • Profile picture of Armando Dsouga
      Armando Dsouga replied 5 years, 4 months ago

      Thanks I got it to work now. Cheers!

    • Profile picture of wildcard
      wildcard replied 1 year ago

      didnt work for me either, i used index IN (wineventlog, security) source=wineventlog* .
      I know this part works, but the dashboard shows no data

  • Profile picture of DaveyBoy
    5 years, 7 months ago

    DaveyBoy commented on the post, Detect Username Guessing Brute Force Attacks

    In reply to: DaveyBoy wrote a new post The below will detect a form of brute force which most will miss. Whereas other scripts detect multiple logins against a single account, they fail to detect 4 failed logins against 40 […] View

    You just need to drill into each user independently and finish with a

    | stats count by host

    or

    | stats count by Source_Network_Address

    It depends where its failing.

    source=”wineventlog:security” EventCode=4625
    | rex “Account For Which Logon Failed:s*Security ID:s*(?.*)s*Account Name:s*(?.*)s*Account Domain:s*(?.*)s*Fail”
    | stats…[Read more]

  • Profile picture of DaveyBoy
    7 years, 1 month ago

    DaveyBoy wrote a new post

    The below will detect a form of brute force which most will miss. Whereas other scripts detect multiple logins against a single account, they fail to detect 4 failed logins against 40 accounts.

    This first […]

    • Profile picture of jbillings
      jbillings replied 6 years, 1 month ago

      I like it, but these are the modifications I made to resolve some issues I had and output more information about the accounts involved. Cleans up the time also.

      sourcetype=wineventlog EventCode=4625 OR EventCode=4624
      | bin _time span=5m as minute
      | stats count(Keywords) as Attempts,
      count(eval(match(Keywords,”Audit Failure”))) as Failed,
      count(eval(match(Keywords,”Audit Success”))) as Success by minute user
      | where Failed>=4
      |stats values(user) AS userlist dc(user) AS Total BY minute
      | where Total>5
      | eval minute=strftime(minute,”%m/%d/%y %H:%M:%S”)

    • Profile picture of DaveyBoy
      DaveyBoy replied 5 years, 7 months ago

      You just need to drill into each user independently and finish with a

      | stats count by host

      or

      | stats count by Source_Network_Address

      It depends where its failing.

      source=”wineventlog:security” EventCode=4625
      | rex “Account For Which Logon Failed:s*Security ID:s*(?.*)s*Account Name:s*(?.*)s*Account Domain:s*(?.*)s*Fail”
      | stats count by host accountName
      | sort count desc

      This will tell you which account has failed and the machine it failed on. If it was attempting to connect to a network resource change the stats count to “stats count by Source_Network_Address accountName” and that should give you the offending host.

  • Profile picture of DaveyBoy
    7 years, 1 month ago

    DaveyBoy wrote a new post

    This query will display a bar chart of all successful Internal vs External SSH connections. Useful for identifying any spikes in connectivity coming from within your network remit or outside of it. Simply change […]

  • Profile picture of DaveyBoy
    7 years, 1 month ago

    DaveyBoy wrote a new post

    This displays a list of failed attempts against each connecting IP. Can be used to detect brute force from a particular source IP. You can then put a block up via ACL or whatever method you chose to mitigate the […]

  • Profile picture of DaveyBoy
    7 years, 1 month ago

    DaveyBoy became a registered member

  • Profile picture of DaveyBoy
    7 years, 1 month ago

    DaveyBoy became a registered member

  • Home
  • Log In
  • Register
  • About GoSplunk
  • GoSplunk FAQs
  • Contact the GoSplunk Team
  • Splunk Website
  • Splunk Documentation
  • Splunk Answers

GoSplunk is not affiliated with Splunk Inc. in any way.

© 2019 GoSplunk
  • Privacy Policy
  • Terms and Conditions
  • Forgot Password?
sponsored