[ossec-list] Re: OSSEC 2.9.2 release

2017-08-15 Thread Fredrik Hilmersson
Great job! Much appreciated. Den torsdag 10 augusti 2017 kl. 01:09:46 UTC+2 skrev dan (ddpbsd): > > OSSEC 2.9.2 has been released. This is mostly a bug-fix/rules update > release. > Thank you to everyone who has contributed time and effort into the > project, it is truly appreciated! > > Get

[ossec-list] Re: OSSEC create a decoder (31101)

2017-08-15 Thread Fredrik Hilmersson
rev Fredrik Hilmersson: > > Hello, > > I would like some help and pointers to create a decoder. So I ran the line > from the access log (see below). What I would like to accomplish is to > match: python-requests/2.2.1 However as you can see at the > moment the default decoder f

[ossec-list] Re: OSSEC rule match time and timeframe

2017-07-11 Thread Fredrik Hilmersson
egards. > > On Monday, July 3, 2017 at 12:10:18 PM UTC+2, Fredrik Hilmersson wrote: >> >> Hello, >> >> Lets say I have a script which runs once every half an hour. With a >> latency difference in about 10-20 seconds. >> Would it be possible to m

[ossec-list] OSSEC rule match time and timeframe

2017-07-03 Thread Fredrik Hilmersson
Hello, Lets say I have a script which runs once every half an hour. With a latency difference in about 10-20 seconds. Would it be possible to match the following: 1. Time 2. Hostname 3. Username The reason I prefer more than a single match, i.e only time is to not by mistake miss an actual

[ossec-list] Re: Rule fired but active-response didn't work

2017-07-03 Thread Fredrik Hilmersson
Hey, I had a similar issue with the active response not working as intended. The way I solved it was to add the following to the ossec.conf ossec-server 30,60,120,240,480 no kind regards, Fredrik Den måndag 3 juli 2017 kl. 12:05:36 UTC+2 skrev Tunguyen: > > My rule

[ossec-list] Re: Rule fired but active-response didn't work

2017-07-03 Thread Fredrik Hilmersson
ossec.conf on the AGENT side, forgot to mention! Den måndag 3 juli 2017 kl. 12:14:30 UTC+2 skrev Fredrik Hilmersson: > > Hey, I had a similar issue with the active response not working as > intended. The way I solved it was to add the following to the ossec.conf > > > >

[ossec-list] Re: I'm unclear why my rule is not matching...

2017-07-03 Thread Fredrik Hilmersson
What happens if you change using 192.168.1.255? Den måndag 3 juli 2017 kl. 14:29:48 UTC+2 skrev Ian Brown: > > I've got this event log in windows: > > 2017 Jul 02 22:38:47 WinEvtLog: Security: AUDIT_FAILURE(5152): > Microsoft-Windows-Security-Auditing: (no user): no domain: leaf-1: The >

[ossec-list] OSSEC create a decoder (31101)

2017-08-04 Thread Fredrik Hilmersson
Hello, I would like some help and pointers to create a decoder. So I ran the line from the access log (see below). What I would like to accomplish is to match: python-requests/2.2.1 However as you can see at the moment the default decoder for rule 31101, does only store the srcip, url and id

[ossec-list] Re: OSSEC ignore ip issue

2017-06-20 Thread Fredrik Hilmersson
> >> Remote IP >> no_email_alert >> >> Ignoring host remote IP >> >> >> >> However, I still get alerts sent to me when connecting to any ossec agent >> through that remote host. >> >> Den måndag 19 juni 2017 kl. 16:27:4

Re: [ossec-list] OSSEC block vulnerability scanners head user_agent

2017-06-24 Thread Fredrik Hilmersson
Thank you! Den lördag 24 juni 2017 kl. 21:21:48 UTC+2 skrev dan (ddpbsd): > > On Sat, Jun 24, 2017 at 2:08 PM, Fredrik Hilmersson > <f.hilm...@worldclearing.org > wrote: > > Hello, > > > > so recently I got spammed by this vulnerability scanner. > >

[ossec-list] Re: OSSEC ignore ip issue

2017-06-24 Thread Fredrik Hilmersson
> If you share your rules, you may help other user with the same issue. > > Regards. > > On Tuesday, June 20, 2017 at 2:31:57 PM UTC+2, Fredrik Hilmersson wrote: >> >> Thanks alot Jesus, >> >> did solve it by creating two local rules one for rule 5715

Re: [ossec-list] OSSEC block vulnerability scanners head user_agent

2017-06-24 Thread Fredrik Hilmersson
I spoke to early, Still getting spammed ... Den lördag 24 juni 2017 kl. 22:20:13 UTC+2 skrev Fredrik Hilmersson: > > Thank you! > > Den lördag 24 juni 2017 kl. 21:21:48 UTC+2 skrev dan (ddpbsd): >> >> On Sat, Jun 24, 2017 at 2:08 PM, Fredrik Hilmersson >> <f

[ossec-list] OSSEC block vulnerability scanners head user_agent

2017-06-24 Thread Fredrik Hilmersson
Hello, so recently I got spammed by this vulnerability scanner. The HEAD is always the same, in regards to the $user_agent, *Jorgee* ** Alert 1498324205.1278330: - web,accesslog, 2017 Jun 24 17:10:05 (OSSEC AGENT) SRCIP->/var/log/nginx/access.log Rule: 31101 (level 5) -> 'Web server 400 error

Re: [ossec-list] OSSEC block vulnerability scanners head user_agent

2017-06-26 Thread Fredrik Hilmersson
ption: 'Jorgee vulnerability scanner' Kind regards, Fredrik Den måndag 26 juni 2017 kl. 10:48:16 UTC+2 skrev Jesus Linares: > > What is the output of ossec-logtest?. > > Once you have a rule for that event, you can create an active response. > > Regards. > > On Sunday, June 25,

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-23 Thread Fredrik Hilmersson
-options/manual-integration.html > > I hope it helps. > Regards. > > On Monday, May 22, 2017 at 4:53:56 PM UTC+2, Fredrik Hilmersson wrote: >> >> Hello Miguelangel! >> >> I do not see any new rows regarding the agent-ossec.com (within the host >> active-response.log, o

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-23 Thread Fredrik Hilmersson
Clarification: The host specific alerts are sent to slack but the agent alerts are being ignored. -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-23 Thread Fredrik Hilmersson
> > Clarification: The host specific alerts are sent to slack but the agent >> alerts are being ignored. > > Review your integrator configuration, maybe you have a filter to get only > alerts in the current host. Share here the config. > > Regards. > > > On T

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-22 Thread Fredrik Hilmersson
gt; from etc/ossec.conf regarding slack > notification?, > thanks. > > Regards, > > On Sun, May 21, 2017 at 4:18 PM, Fredrik Hilmersson < > f.hilm...@worldclearing.org > wrote: > >> I set up a OSSEC server along with an remote agent. The alert log file is &g

[ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-21 Thread Fredrik Hilmersson
I set up a OSSEC server along with an remote agent. The alert log file is populated with alerts regarding both the host and the agent. However, the integrated slack notification script only send reports regarding the host. The only difference within the log is how the hostnames are displayed,

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-24 Thread Fredrik Hilmersson
ope it helps. > > On Tuesday, May 23, 2017 at 12:46:36 PM UTC+2, Fredrik Hilmersson wrote: >> >> Hello again Jesus, >> >> As I did state, so we're not misunderstanding each other, I do not run >> the wazuh forked version, but the 2.9.0 OSSEC version. >

Re: [ossec-list] OSSEC slack alerts for agents v2.9.0

2017-05-24 Thread Fredrik Hilmersson
om alerts*.log *filtering by >>>*rule_id*, *level*, *group *or *event_location*. >>>- It executes the script using the arguments *hook_url *and *api_key* >>>. >>>- The slack script send the alert to slack. >>> >>> Clarific

[ossec-list] OSSEC exclude IP and prevent alert trigger

2017-05-29 Thread Fredrik Hilmersson
Hello, let me try make myself understod. So i've got the part to ignore/exclude an specific IP to work, thats no problem. However, here's my issue/problem I'd like to solve. 7 cronjobIP Ignorning cronjobIP 1. Ignore specific IP which run regular cronjob's and utilizes SSH (done). 2. The

[ossec-list] Re: OSSEC exclude IP and prevent alert trigger

2017-05-30 Thread Fredrik Hilmersson
kl. 09:52:41 UTC+2 skrev Fredrik Hilmersson: > > Hello, let me try make myself understod. So i've got the part to > ignore/exclude an specific IP to work, thats no problem. However, here's my > issue/problem I'd like to solve. > > > 7 > cronjobIP > Ignorning

[ossec-list] OSSEC ignore ip issue

2017-06-19 Thread Fredrik Hilmersson
Hello, So I got the following custom rule on the ossec server: 5500 session opened for user Login session opened. authentication_success, Then afterwards I use the local rule on the ossec server to avoid alert spam from a specific IP: 2 MYIP Ignoring ip

[ossec-list] Re: OSSEC 2.9.2 Slack integration integrity check alert no hostname

2017-09-11 Thread Fredrik Hilmersson
Update: i'm aware that the ossec,syscheck Alert does state the hostname, however when performing multiple updates/upgrades on several agents, its rather hard to keep track of which alert belong to which ossec/syscheck. Den måndag 11 september 2017 kl. 13:56:41 UTC+2 skrev Fredrik Hilmersson

[ossec-list] OSSEC 2.9.2 Slack integration integrity check alert no hostname

2017-09-11 Thread Fredrik Hilmersson
Hello, I'm wondering if it would be possible to do a small update regarding the ossec-slack integration to report from which host the integrity check reports from. Today an alert message looks like: Rule: 551 (level 7) -> 'Integrity checksum changed again (2nd time).' Integrity checksum

[ossec-list] Source Leak Scan Increase(?)

2018-09-07 Thread Fredrik Hilmersson
Hello, I noticed recently that my cloud servers has got increased requests for a long range of php files from same source IP. If i'm not the only one, I started to collect the page requests to a list. However, I seen that some of the requests get caught for instance by PSAD and matching

Re: [ossec-list] PSAD rule include error

2018-08-31 Thread Fredrik Hilmersson
Hello Dan, well that solved it! I added the rule in the top of the list, adding it where you suggested (in your conf) and no issues. Thanks for the response as always! Den torsdag 30 augusti 2018 kl. 13:19:17 UTC+2 skrev dan (ddpbsd): > > On Thu, Aug 30, 2018 at 4:11 AM Fredrik Hilm

[ossec-list] PSAD rule include error

2018-08-30 Thread Fredrik Hilmersson
Hello, The ruleset psad_rules.xml which is included in the 3.0.0 version is not by default included in the ossec.conf file. When i add the the include: psad_rules.xml within the I get the following error: ossec-testrule: INFO: Reading local decoder file. rules_list: Category '1' not found.

[ossec-list] Re: Source Leak Scan Increase(?)

2018-09-25 Thread Fredrik Hilmersson
ot;Mozilla/5.0" IP - - [24/Sep/2018:14:10:36 +0200] "GET /log.php HTTP/1.1" 404 162 "-" "Mozilla/5.0" IP - - [24/Sep/2018:14:10:36 +0200] "GET /hell.php HTTP/1.1" 404 162 "-" "Mozilla/5.0" IP - - [24/Sep/2018:14:10:37 +0200] "GET /pmd_