Hi,

Ok!  Getting closer to figuring this out.  The full_command data is getting 
from the client to the server (and being logged in the archives.log file after 
using the global.logall option.)  It looks like the message is NOT being 
decoded as Rule 530 though.

This is from my archives.log:
2010 Oct 18 09:14:29 (SERVER01) 172.1.3.1->netstat -an | find "LISTEN" ossec: 
output: 'netstat -an | find "LISTEN"':
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING
  TCP    0.0.0.0:443            0.0.0.0:0              LISTENING
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING
  TCP    0.0.0.0:1025           0.0.0.0:0              LISTENING
  TCP    0.0.0.0:1164           0.0.0.0:0              LISTENING
  TCP    0.0.0.0:3389           0.0.0.0:0              LISTENING

Pasting the first line into the logtest application gives me this output:

2010 Oct 18 09:14:29 (SERVER01) 172.1.3.1->netstat -an | find "LISTEN" ossec: 
output: 'netstat -an | find "LISTEN"':

**Phase 1: Completed pre-decoding.
       full event: '2010 Oct 18 09:14:29 (SERVER01) 172.1.3.1->netstat -an | 
find "LISTEN" ossec: output: 'netstat -an | find "LISTEN"':'
       hostname: 'ossecsvr'
       program_name: '(null)'
       log: '2010 Oct 18 09:14:29 (SERVER01) 172.1.3.1->netstat -an | find 
"LISTEN" ossec: output: 'netstat -an | find "LISTEN"':'

**Phase 2: Completed decoding.
       No decoder matched.

And the rule 530 that is in the ossec_rules.xml file:

<!-- Process monitoring rules -->
  <rule id="530" level="0">
    <if_sid>500</if_sid>
    <match>^ossec: output: </match>
    <description>OSSEC process monitoring rules.</description>
    <group>process_monitor,</group>
  </rule>

Reply via email to