So where is the hack?
--
Sent from my iPhone
On Mar 3, 2011, at 5:06 PM, jplee3 <[email protected]> wrote:
Whitelisting the scanner doesn't solve the problem, because someone
else might inadvertently scan one system and cause AR to fire on a
completely different system where it shouldn't have fired.
I basically just want AR to fire for a specific group of machines
whenever a certain alert gets tripped on only those machines.
I think I figured it out either way though. This appears to do the
job:
<rule id="5722" level="5">
<if_sid>5710</if_sid>
<hostname>ssh1|ssh2<hostname>
<match>illegal user|invalid user</match>
<description>Attempt to login using a non-existent user</
description>
<group>invalid_login,authentication_failed,</group>
</rule>
<rule id="5723" level="10" frequency="10" timeframe="120">
<if_matched_sid>5722</if_matched_sid>
<description>SSHD brute force trying to get access to </
description>
<description>the system.</description>
<same_source_ip />
<group>authentication_failures,</group>
</rule>
On Mar 3, 1:32 pm, satish patel <[email protected]> wrote:
I'd say use whitelist. and add your scannser IP in whitelist
I have same issue and and i guess that is only option we have.
On Thu, Mar 3, 2011 at 4:21 PM, jplee3 <[email protected]> wrote:
Hey guys,
So I noticed this while running an internal Nessus scan on the
network. Apparently AR kicked in because certain rules fired (5712
to
be exact) which are not host-specific and ended up null-routing the
Nessus scanner machine on the defined-agents I have setup for AR.
Anyway, I just came across this -http://www.ossec.net/wiki/Know_How:Ignore_Rules
Can I add multiple hostnames delimited by "," or "|" so that the
rules
(and subsequently the ARs) will fire only on the hosts of origin?
I would use "local" but I want AR to occur on a subset of my agents
(not all of them).
Unless there's another way to do this.
Any ideas?