Open
Description
Hello, ZAT helps me a lot, but I think ZAT fails to handle '#' properly. In a sql injection event, the url contains character '#' and ZAT ignore the contents after it. The two picture can describe this:
This picture is Zeek's http.log, you can see the url is /dv/vulnerabilities/sqli/?id=1'+and+1=1#&Submit=Submit
But when I debug my python program, the uri only record url as /dv/vulnerabilities/sqli/?id=1'+and+1=1
and all fields after uri is None. That is ,missing all contents after '#'.
My usage of ZAT is like this:logdict = json.loads(LogToDataFrame().create_dataframe(fullname).to_json(orient='records'))
Metadata
Metadata
Assignees
Labels
No labels