SQL INJECTION
This query will try to identify automated attack tool and its payload
SPLUNK: Search & Reporting
SPL: sourcetype=web_traffic client_ip="<REDACTED>" AND user_agent IN ("*sqlmap*", "*Havij*") | table _time, path, status
DTG: All time
TAB: Statistics
* specific attack strings like SLEEP(5) is a good indication of malicious activity
A 504 status code often confirms a successful time-based SQL injection attackLast updated