heroui logo

HTTP Rapid POST with Mixed Status Codes

Splunk Security Content

View Source
Summary
This detection rule aims to identify rapid-fire POST request attacks targeting web servers, specifically assessing situations where more than 20 POST requests are made within a 5-second timeframe. Such patterns could suggest attempts to exploit race conditions or overwhelm the target's request handling capabilities. The rule pays special attention to the variance in size and status codes of the responses to pinpoint potential exploitation efforts or attempts to probe for vulnerabilities in endpoints. Thus, the identification of abnormal HTTP POST request activity can help security teams to mitigate risks associated with web application vulnerabilities. The search uses Nginx access logs to filter the relevant data and can be implemented without additional configuration by leveraging existing Splunk web log collection methods.
Categories
  • Web
  • Network
Data Sources
  • Named Pipe
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1071.001
  • T1190
  • T1595
Created: 2025-10-14