Hello Jesus,

So, I think I've got the rule to work.

1. Rule:

<rule id="100205" level="0">
  <if_sid>31101</if_sid>
  <decoded_as>web-accesslog</decoded_as>
  <match> Jorgee$</match>
  <description>Jorgee vulnerability scanner</description>
</rule>

2. Logtest output:

SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD http://HOSTIP:80/phpmyadmin4/ 
HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee

**Phase 1: Completed pre-decoding.
full event: 'SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD 
http://HOSTIP:80/phpmyadmin4/ 
HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee'

  hostname: 'agent-id'
 program_name: '(null)'
 log: 'SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD 
http://HOSTIP:80/phpmyadmin4/ HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee'

**Phase 2: Completed decoding.

  decoder: 'web-accesslog'
  srcip: 'SRCIP'
  url: 'http://HOSTIP:80/phpmyadmin4/'
  id: '404'

**Phase 3: Completed filtering (rules).

  Rule id: '100205'
  Level: '0'
  Description: 'Jorgee vulnerability scanner'

Kind regards,
Fredrik

Den måndag 26 juni 2017 kl. 10:48:16 UTC+2 skrev Jesus Linares:
>
> What is the output of ossec-logtest?.
>
> Once you have a rule for that event, you can create an active response.
>
> Regards.
>
> On Sunday, June 25, 2017 at 12:06:23 AM UTC+2, Fredrik Hilmersson wrote:
>>
>> I spoke to early, Still getting spammed ...
>>
>> Den lördag 24 juni 2017 kl. 22:20:13 UTC+2 skrev Fredrik Hilmersson:
>>>
>>> Thank you!
>>>
>>> Den lördag 24 juni 2017 kl. 21:21:48 UTC+2 skrev dan (ddpbsd):
>>>>
>>>> On Sat, Jun 24, 2017 at 2:08 PM, Fredrik Hilmersson 
>>>> <f.hilm...@worldclearing.org> wrote: 
>>>> > Hello, 
>>>> > 
>>>> > so recently I got spammed by this vulnerability scanner. 
>>>> > The HEAD is always the same, in regards to the $user_agent, Jorgee 
>>>> > 
>>>> > ** Alert 1498324205.1278330: - web,accesslog, 
>>>> > 2017 Jun 24 17:10:05 (OSSEC AGENT) SRCIP->/var/log/nginx/access.log 
>>>> > Rule: 31101 (level 5) -> 'Web server 400 error code.' 
>>>> > 213.119.18.4 - - [24/Jun/2017:19:10:05 +0200] HEAD 
>>>> > http://SRCIP:80/sql/phpmyadmin2/ HTTP/1.1 404 0 - Mozilla/5.0 Jorgee 
>>>> > 
>>>> > So i'm wondering if anyone has a good idea or rule how to block/ban 
>>>> these 
>>>> > attempts? 
>>>> > 
>>>> > Kind regards, 
>>>> > Fredrik 
>>>> > 
>>>>
>>>> Possibly something like: 
>>>> <rule id="999999" level="0"> 
>>>>   <decoded_as>nginx-errorlog</decoded_as> 
>>>>   <match> Jorgee$</match> 
>>>>   <description>Jorgee is loud</description> 
>>>> </rule> 
>>>>
>>>>
>>>> > -- 
>>>> > 
>>>> > --- 
>>>> > You received this message because you are subscribed to the Google 
>>>> Groups 
>>>> > "ossec-list" group. 
>>>> > To unsubscribe from this group and stop receiving emails from it, 
>>>> send an 
>>>> > email to ossec-list+...@googlegroups.com. 
>>>> > For more options, visit https://groups.google.com/d/optout. 
>>>>
>>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to