

from is the origin and to the target name of the field. The field key contains a from: old-key and a to: new-key pair. Set aside some time for your team when you first run this for all time, you may be surprised how much you can see. The decodebase64field processor specifies a field to base64 decode. Note that this is a profiling search where I filter out the false positives to view all the new unknowns. This search is fast enough to go back all time so it can be a great review for historical events. It will be a bit longer in production but not crazy long.

After adding the Splunk Decrypt addon 2655 to decode powershell encoded scripts I ran into a problem.

This tutorial builds on the work of others with some new cleverness to provide an efficient decoding of powershell commands for threat hunting. A limitation exists in Base64 Python lib that made me develop this Perl version: it does not handle padding the right way. If you already have powershell event logs in Splunk and want to decode the base64, this may help. The regex is where I filter known goods. Base64 encode or decode fields using Perl instead of Python Splunkbase Base64 encode or decode fields using Perl instead of Python A Perl version of Cedric Le Roux base64 encode/decode.
#Splunk base64 decode code#
You can obtain the example code by pressing the copy image button and it will be copied to your clipboard.
