F5Telemetry_ASM_CL
| where RequestStatus == "passed"
| where ResponseCode startswith "2"
| where SourceIP !startswith "3.31.100"
| where SourceIP !startswith "10.84"
| where 
       Request contains "////etc/passwd"
    or Request contains "/%E3%80%B1oast.me"
    or (Request has "GET" and Request contains "/../")
    or (Request has "POST" and Request contains @"(java")

threat hunting came back clean. I’ve put together an optimized version of the rule that keeps your exact detection logic but separates the filters into individual where clauses for better stability and maintainability. It also makes future updates easier to manage. Let me know if you’re comfortable replacing the current rule with this optimized version.

LinkedIn
X
Facebook

Related Articles

Leave a Comment

Your email address will not be published. Required fields are marked *

Copyright © 2025 Yakubu Bello - Cyber Security Expert