Hello, ZAT helps me a lot, but I think ZAT fails to handle '#' properly. In a sql injection event, the url contains character '#' and ZAT ignore the contents after it. The two picture can describe this:
This picture is Zeek's http.log, you can see the url is /dv/vulnerabilities/sqli/?id=1'+and+1=1#&Submit=Submit

But when I debug my python program, the uri only record url as /dv/vulnerabilities/sqli/?id=1'+and+1=1 and all fields after uri is None. That is ,missing all contents after '#'.

My usage of ZAT is like this:logdict = json.loads(LogToDataFrame().create_dataframe(fullname).to_json(orient='records'))
Hello, ZAT helps me a lot, but I think ZAT fails to handle '#' properly. In a sql injection event, the url contains character '#' and ZAT ignore the contents after it. The two picture can describe this:
This picture is Zeek's http.log, you can see the url is


/dv/vulnerabilities/sqli/?id=1'+and+1=1#&Submit=SubmitBut when I debug my python program, the uri only record url as
/dv/vulnerabilities/sqli/?id=1'+and+1=1and all fields after uri is None. That is ,missing all contents after '#'.My usage of ZAT is like this:
logdict = json.loads(LogToDataFrame().create_dataframe(fullname).to_json(orient='records'))