On Wed, Dec 4, 2013 at 10:05 PM, dan (ddp) <[email protected]> wrote:
> On Wed, Dec 4, 2013 at 8:37 PM, Gustavo Guillermo Perez
> <[email protected]> wrote:
>> Hello list, I'm having a configuration with many agents and a single server,
>> after upgrading from 2.7.0 to 2.7.1 ossec server stop logging urlsnarf
>> alerts, urlsnarf is apache access like  url sniffer logging.
>> Is important to mention that all other alerts, like ssh or snort are working
>> just fine.
>>
>
> Comment out the pure-transfer decoder.
>

Actually, that causes other issues. If you do that you'll have to
remove the pure-ftpd rules too.
If you modify the prematch in the pure-transfer decoder though, you
won't have to do anything else.

>>
>> Before the upgrade the Alert appears as follow:
>> Level:
>> 13 - Non standard syslog message (size too large).
>> Rule Id:
>> 1003
>> Location:
>> (server) 192.168.1.1->/var/log/urlsnarf/urlsnarf.log
>> 192.168.1.2 - - [03/Dec/2013:23:53:53 -0600] "GET
>> http://www.6pm.com/le.cgi?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
>>
>>
>> Here is my agent ossec.conf:
>> <ossec_config>
>>   <client>
>>     <server-ip>10.206.85.72</server-ip>
>>   </client>
>>
>>   <syscheck>
>>     <!-- Frequency that syscheck is executed - default to every 22 hours -->
>>     <frequency>79200</frequency>
>>
>>     <!-- Directories to check  (perform all possible verifications) -->
>>     <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
>>     <directories check_all="yes">/bin,/sbin</directories>
>>
>>     <!-- Files/directories to ignore -->
>>     <ignore>/etc/mtab</ignore>
>>     <ignore>/etc/mnttab</ignore>
>>     <ignore>/etc/hosts.deny</ignore>
>>     <ignore>/etc/mail/statistics</ignore>
>>     <ignore>/etc/random-seed</ignore>
>>     <ignore>/etc/adjtime</ignore>
>>     <ignore>/etc/httpd/logs</ignore>
>>     <ignore>/etc/utmpx</ignore>
>>     <ignore>/etc/wtmpx</ignore>
>>     <ignore>/etc/cups/certs</ignore>
>>     <ignore>/etc/dumpdates</ignore>
>>     <ignore>/etc/svc/volatile</ignore>
>>
>>     <!-- Windows files to ignore -->
>>     <ignore>C:\WINDOWS/System32/LogFiles</ignore>
>>     <ignore>C:\WINDOWS/Debug</ignore>
>>     <ignore>C:\WINDOWS/WindowsUpdate.log</ignore>
>>     <ignore>C:\WINDOWS/iis6.log</ignore>
>>     <ignore>C:\WINDOWS/system32/wbem/Logs</ignore>
>>     <ignore>C:\WINDOWS/system32/wbem/Repository</ignore>
>>     <ignore>C:\WINDOWS/Prefetch</ignore>
>>     <ignore>C:\WINDOWS/PCHEALTH/HELPCTR/DataColl</ignore>
>>     <ignore>C:\WINDOWS/SoftwareDistribution</ignore>
>>     <ignore>C:\WINDOWS/Temp</ignore>
>>     <ignore>C:\WINDOWS/system32/config</ignore>
>>     <ignore>C:\WINDOWS/system32/spool</ignore>
>>     <ignore>C:\WINDOWS/system32/CatRoot</ignore>
>>   </syscheck>
>>
>>   <rootcheck>
>>     <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
>>
>> <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
>>     <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
>>   </rootcheck>
>>   <!-- Files to monitor (localfiles) -->
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/messages</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/auth.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/syslog</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/mail.info</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/dpkg.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>apache</log_format>
>>     <location>/var/log/apache2/error.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>apache</log_format>
>>     <location>/var/log/apache2/access.log</location>
>>   </localfile>
>>
>> <!-- <localfile>
>>     <log_format>command</log_format>
>>     <command>df -h</command>
>>   </localfile>
>> -->
>>
>> <!--  <localfile>
>>     <log_format>full_command</log_format>
>>     <command>netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort</command>
>>   </localfile>
>> -->
>> <!--  <localfile>
>>     <log_format>full_command</log_format>
>>     <command>last -n 5</command>
>>   </localfile>
>> -->
>>   <localfile>
>>     <log_format>multi-line:10</log_format>
>>     <location>/var/log/snort/alert.full</location>
>>   </localfile>
>>
>>  <localfile>
>>     <log_format>multi-line:20</log_format>
>>     <location>/var/log/snort/ascii-tcpdump.log.*</location>
>>   </localfile>
>>
>>       <localfile>
>>       <log_format>apache</log_format>
>>       <location>/var/log/urlsnarf/urlsnarf.log</location>
>>      </localfile>
>> </ossec_config>
>>
>> and the agent ossec-init.conf
>> DIRECTORY="/var/ossec"
>> VERSION="v2.7.1"
>> DATE="mié dic  4 12:33:24 CST 2013"
>> TYPE="agent"
>>
>> And the server ossec.conf
>> <ossec_config>
>>   <global>
>>     <email_notification>yes</email_notification>
>>     <email_to>ossec@ossec</email_to>
>>     <smtp_server>127.0.0.1</smtp_server>
>>     <email_from>ossecm@ossec</email_from>
>>     <!-- <logall>yes</logall> -->
>>   </global>
>>
>>   <rules>
>>     <include>rules_config.xml</include>
>>     <include>pam_rules.xml</include>
>>     <include>sshd_rules.xml</include>
>>     <include>telnetd_rules.xml</include>
>>     <include>syslog_rules.xml</include>
>>     <include>arpwatch_rules.xml</include>
>>     <include>symantec-av_rules.xml</include>
>>     <include>symantec-ws_rules.xml</include>
>>     <include>pix_rules.xml</include>
>>     <include>named_rules.xml</include>
>>     <include>smbd_rules.xml</include>
>>     <include>vsftpd_rules.xml</include>
>>     <include>pure-ftpd_rules.xml</include>
>>     <include>proftpd_rules.xml</include>
>>     <include>ms_ftpd_rules.xml</include>
>>     <include>ftpd_rules.xml</include>
>>     <include>hordeimp_rules.xml</include>
>>     <include>roundcube_rules.xml</include>
>>     <include>wordpress_rules.xml</include>
>>     <include>cimserver_rules.xml</include>
>>     <include>vpopmail_rules.xml</include>
>>     <include>vmpop3d_rules.xml</include>
>>     <include>courier_rules.xml</include>
>>     <include>web_rules.xml</include>
>>     <include>web_appsec_rules.xml</include>
>>     <include>apache_rules.xml</include>
>>     <include>nginx_rules.xml</include>
>>     <include>php_rules.xml</include>
>>     <include>mysql_rules.xml</include>
>>     <include>postgresql_rules.xml</include>
>>     <include>ids_rules.xml</include>
>>     <include>squid_rules.xml</include>
>>     <include>firewall_rules.xml</include>
>>     <include>cisco-ios_rules.xml</include>
>>     <include>netscreenfw_rules.xml</include>
>>     <include>sonicwall_rules.xml</include>
>>     <include>postfix_rules.xml</include>
>>     <include>sendmail_rules.xml</include>
>>     <include>imapd_rules.xml</include>
>>     <include>mailscanner_rules.xml</include>
>>     <include>dovecot_rules.xml</include>
>>     <include>ms-exchange_rules.xml</include>
>>     <include>racoon_rules.xml</include>
>>     <include>vpn_concentrator_rules.xml</include>
>>     <include>spamd_rules.xml</include>
>>     <include>msauth_rules.xml</include>
>>     <include>mcafee_av_rules.xml</include>
>>     <include>trend-osce_rules.xml</include>
>>     <include>ms-se_rules.xml</include>
>>     <!-- <include>policy_rules.xml</include> -->
>>     <include>zeus_rules.xml</include>
>>     <include>solaris_bsm_rules.xml</include>
>>     <include>vmware_rules.xml</include>
>>     <include>ms_dhcp_rules.xml</include>
>>     <include>asterisk_rules.xml</include>
>>     <include>ossec_rules.xml</include>
>>     <include>attack_rules.xml</include>
>>     <include>openbsd_rules.xml</include>
>>     <include>clam_av_rules.xml</include>
>>     <include>bro-ids_rules.xml</include>
>>     <include>dropbear_rules.xml</include>
>>     <include>local_rules.xml</include>
>>   </rules>
>>
>>   <syscheck>
>>     <!-- Frequency that syscheck is executed - default to every 22 hours -->
>>     <frequency>79200</frequency>
>>
>>     <!-- Directories to check  (perform all possible verifications) -->
>>     <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
>>     <directories check_all="yes">/bin,/sbin</directories>
>>
>>     <!-- Files/directories to ignore -->
>>     <ignore>/etc/mtab</ignore>
>>     <ignore>/etc/mnttab</ignore>
>>     <ignore>/etc/hosts.deny</ignore>
>>     <ignore>/etc/mail/statistics</ignore>
>>     <ignore>/etc/random-seed</ignore>
>>     <ignore>/etc/adjtime</ignore>
>>     <ignore>/etc/httpd/logs</ignore>
>>     <ignore>/etc/utmpx</ignore>
>>     <ignore>/etc/wtmpx</ignore>
>>     <ignore>/etc/cups/certs</ignore>
>>     <ignore>/etc/dumpdates</ignore>
>>     <ignore>/etc/svc/volatile</ignore>
>>
>>     <!-- Windows files to ignore -->
>>     <ignore>C:\WINDOWS/System32/LogFiles</ignore>
>>     <ignore>C:\WINDOWS/Debug</ignore>
>>     <ignore>C:\WINDOWS/WindowsUpdate.log</ignore>
>>     <ignore>C:\WINDOWS/iis6.log</ignore>
>>     <ignore>C:\WINDOWS/system32/wbem/Logs</ignore>
>>     <ignore>C:\WINDOWS/system32/wbem/Repository</ignore>
>>     <ignore>C:\WINDOWS/Prefetch</ignore>
>>     <ignore>C:\WINDOWS/PCHEALTH/HELPCTR/DataColl</ignore>
>>     <ignore>C:\WINDOWS/SoftwareDistribution</ignore>
>>     <ignore>C:\WINDOWS/Temp</ignore>
>>     <ignore>C:\WINDOWS/system32/config</ignore>
>>     <ignore>C:\WINDOWS/system32/spool</ignore>
>>     <ignore>C:\WINDOWS/system32/CatRoot</ignore>
>>   </syscheck>
>>
>>   <rootcheck>
>>     <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
>>
>> <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
>>     <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
>>
>> <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
>>   </rootcheck>
>>
>>   <global>
>>     <white_list>127.0.0.1</white_list>
>>     <white_list>^localhost.localdomain$</white_list>
>>     <white_list>10.206.85.26</white_list>
>>     <white_list>10.206.85.25</white_list>
>>   </global>
>>
>>   <remote>
>>     <connection>syslog</connection>
>>   </remote>
>>
>>   <remote>
>>     <connection>secure</connection>
>>   </remote>
>>
>>   <alerts>
>>     <log_alert_level>1</log_alert_level>
>>     <email_alert_level>7</email_alert_level>
>>   </alerts>
>>
>>   <command>
>>     <name>host-deny</name>
>>     <executable>host-deny.sh</executable>
>>     <expect>srcip</expect>
>>     <timeout_allowed>yes</timeout_allowed>
>>   </command>
>>
>>   <command>
>>     <name>firewall-drop</name>
>>     <executable>firewall-drop.sh</executable>
>>     <expect>srcip</expect>
>>     <timeout_allowed>yes</timeout_allowed>
>>   </command>
>>
>>   <command>
>>     <name>disable-account</name>
>>     <executable>disable-account.sh</executable>
>>     <expect>user</expect>
>>     <timeout_allowed>yes</timeout_allowed>
>>   </command>
>>
>>   <command>
>>     <name>restart-ossec</name>
>>     <executable>restart-ossec.sh</executable>
>>     <expect></expect>
>>   </command>
>>
>>
>>   <command>
>>     <name>route-null</name>
>>     <executable>route-null.sh</executable>
>>     <expect>srcip</expect>
>>     <timeout_allowed>yes</timeout_allowed>
>>   </command>
>>
>>   <!-- Files to monitor (localfiles) -->
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/messages</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/auth.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/syslog</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/mail.info</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>syslog</log_format>
>>     <location>/var/log/dpkg.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>apache</log_format>
>>     <location>/var/log/apache2/error.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>apache</log_format>
>>     <location>/var/log/apache2/access.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>apache</log_format>
>>     <location>/var/log/urlsnarf/urlsnarf.log</location>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>command</log_format>
>>     <command>df -h</command>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>full_command</log_format>
>>     <command>netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort</command>
>>   </localfile>
>>
>>   <localfile>
>>     <log_format>full_command</log_format>
>>     <command>last -n 5</command>
>>   </localfile>
>> </ossec_config>
>>
>> and the server ossec-init.conf
>> DIRECTORY="/var/ossec"
>> VERSION="v2.7.1"
>> DATE="mié dic  4 12:22:50 CST 2013"
>> TYPE="server"
>>
>> And a sample of the urlsnarf access log (scrambled to protect the net):
>> dg4c5f51 - - [04/Dec/2013:19:26:47 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sep$20pts$20engine$20win32_6.1.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> dg4c5f51 - - [04/Dec/2013:19:26:47 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sep$20pts$20content_6.1.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> dg4c5f51 - - [04/Dec/2013:19:26:48 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76antec$20security$20content$20b1_hj76icrodefsb.curdefs_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> dg4c5f51 - - [04/Dec/2013:19:26:48 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76antec$20security$20content$20a1_hj76icrodefsb.curdefs_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> dg4c5f51 - - [04/Dec/2013:19:26:49 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/F0%5E$a0$e3$bc$8d28q2$22$ad$7dQ$b1$e8$b3f_F1%5E$8b$e8$f1$c2$3c$40k$81_F2%5Eo$b9R$28hj76$cd$3b$08$f6$ad$ca6$97$a2$f1$89$22$ad$7dQ$b1$e8$b3f_F3%5E$ab$88$d9$ff$b0$1fM$1e_F4%5E$17c$01W$c7$12$1c$e9_F5%5E$17c$01W$c7$12$1c$e9_F6%5EFQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> dg4c5f51 - - [04/Dec/2013:19:26:49 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/F200%5E$ab$88$d9$ff$b0$1fM$1e_F201%5E$ab$88$d9$ff$b0$1fM$1e_F202%5E$a2$daa$11s$ac$0bG_F203%5E$9b$acv$83$d1$06$1b$f9$04$e7$95z$ea$af$d1$e1_F204%5E$9ey$e5TGM1t$1a$feB$fbx$a8$03a$8f$e1$c2$d3$cc$c1$ab$afH$27$98$b6$d8S5$86Z$19$be$9fB$b2$0a$dd_F205%5EFQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA_F206%5E$10$9f$bb$00$14$93$c24
>> HTTP/1.1" - - "-" "FQvqJ1vFWkhj76dbft0gqhj76aN3G4guoWdWfUgAAAAA"
>> 192.168.1.1 - - [04/Dec/2013:19:26:52 -0600] "GET
>> http://ctldl.windowsupdate.cohj76/hj76sdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c6f5f8ae1fde8394
>> HTTP/1.1" - - "-" "Microsoft-CryptoAPI/6.1"
>> eoperativ12 - - [04/Dec/2013:19:26:53 -0600] "GET
>> http://socialize.us1.gigya.cohj76/socialize.getReactionsCount?forhj76at=jsonp&sdk=js_2.21.14&APIKey=3_pW-ieaOSSffuPEMJFq7gKhj76xiNnFnXoS8tchj76828dhj762h9_X9ykIagCd522yV5G1Mxv&barID=e20131203_Crees&buttonIDs=ayudar-necesitaban-un-cahj76bio%2Cser-lo-hj76ishj76o-hasta-que-cahj76bien-de-directiva%2Cperjudicar-no-hab-a-un-hj76ejor-dt-que-l&gcid=SOxzDt%2FxdjN27wJXzXabthj76Yj6u66V287NxuBRGhj76Etqk%3D&ucid=UnSGno7unQJjopZvhdEGiw%3D%3D&callback=gigya.global.JPCMD.buototype.handleResponse&context=601689666
>> HTTP/1.1" - - "http://hj76sn.hj76ediotiehj76po.cohj76/"; "Mozilla/5.0
>> (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/liveupdate_3.3.0.92_english_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/hj76initri.flg HTTP/1.1" - -
>> "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/autohj76atic$20liveupdate_3.3.0.92_english_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/decohj76poser_1.0.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76event$20installer_12.8_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3 HTTP/1.1" - -
>> "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3"; "Mozilla/5.0
>> (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/hj76s$20light_5.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:57 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sesc$20virus$20definitions$20win32$20v11_hj76icrodefsb.curdefs_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sesc$20virus$20definitions$20win32$20v11_hj76icrodefsb.nov_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://udc.hj76sn.cohj76/c.gif?parsergroup=hops&evt=unload&rid=44cd5a9cce144116a21abbd7fdb68c46&cts=1386207075339&aop=&fk=default&gp=S&optkey=optkey3&clid=123E6CCCE6066D1E390A6F52E2066D1D&di=233&pi=9564&ps=1027&hj76k=es-hj76x&pn=MX+Hohj76epage&pid=251006941&su=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2Fdefault.aspx&pageid=251006941
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sesc$20subhj76ission$20control$20data_11.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sesc$20ips$20signatures$20win32_11.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76antec$20known$20application$20systehj76_1.5.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://www.bing.cohj76/partner/buihj76edns.gif HTTP/1.1" - -
>> "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3"; "Mozilla/5.0
>> (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sep$20pts$20engine$20win32_6.1.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://udc.hj76sn.cohj76/c.gif?parsergroup=hops&evt=ihj76bu&js=1&rid=bad60639f796415bbe9e1a3053c980d9&pp=False&cts=1386207075805&aop=&dv.SNLogin=fb%3Af%2Ctw%3Af&dv.GrpFrMod=tabgroup%3Avideotab%2Csocialid%3Atwitter%2Choyenhj76odule%3Atelhj76ex&hp=0&fk=D1&gp=P&optkey=optkey3&clid=123E6CCCE6066D1E390A6F52E2066D1D&rf=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2F%3Focid%3Dhj76ailsignout%26ar%3D3&cu=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2F%3Focid%3Dhj76ailsignout%26ar%3D3&sl=1&slv=5.1&bh=760&bw=1440&scr=1440x900&sd=24&di=233&pi=9564&ps=1027&hj76k=es-hj76x&pn=MX+Hohj76epage&pid=251006941&su=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2Fdefault.aspx&pageid=251006941&br=MSFT&hj76v=v15
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://b.scorecardresearch.cohj76/b?c1=2&c2=3000001&c7=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2F%3Focid%3Dhj76ailsignout%26ar%3D3&c9=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2F%3Focid%3Dhj76ailsignout%26ar%3D3&rn=1386207075808
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://c.buodigy.hj76sn.cohj76/c.gif?udc=true&di=233&pi=9564&ps=1027&lng=es-hj76x&tp=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2Fdefault.aspx&rid=bad60639f796415bbe9e1a3053c980d9&rnd=1386207075809&rf=http%3A%2F%2Fbuodigy.hj76sn.cohj76%2F%3Focid%3Dhj76ailsignout%26ar%3D3&scr=1440x900
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://rad.hj76sn.cohj76/ADSAdClient31.dll?GetSAd=&DPJS=8&PN=MSFT&ID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D&PG=MX9HT1&AP=1440
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://rad.hj76sn.cohj76/ADSAdClient31.dll?GetSAd=&DPJS=8&PN=MSFT&ID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D&PG=MXHPSA&AP=1402
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://rad.hj76sn.cohj76/ADSAdClient31.dll?GetSAd=&DPJS=8&PN=MSFT&ID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D&PG=MEX002&AP=1402
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://rad.hj76sn.cohj76/ADSAdClient31.dll?GetSAd=&DPJS=8&PN=MSFT&ID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D&PG=MSHPSM&AP=1402
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/sep$20pts$20content_6.1.0_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76antec$20security$20content$20b1_hj76icrodefsb.curdefs_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:58 -0600] "GET
>> http://bs.serving-sys.cohj76/BurstingPipe/adServer.bs?cn=rsb&c=28&pli=8158676&PluID=45&w=300&h=250&ord=1092305315&uchj76=true&ncu=$$http://g.hj76sn.cohj76/_2AD000C5/120000000000159960.1?!&&PID=11734668&UIT=A&TargetID=8078557&N=1092305315&PG=MEX002&ASID=92164b37f1204708a26ece1b2abb6c36&ANID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D$$&z=1
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:26:59 -0600] "GET
>> http://bs.serving-sys.cohj76/BurstingPipe/adServer.bs?cn=rsb&c=28&pli=8403483&PluID=45&w=300&h=125&ord=1932542248&uchj76=true&ncu=$$http://g.hj76sn.cohj76/_2AD000CE/115000000000159506.1?!&&PID=11676114&UIT=A&TargetID=100268026&N=1932542248&PG=MSHPSM&ASID=e9ce6928bbf74631a675a22ee758a95c&ANID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D$$&z=1
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> cohj76buas01 - - [04/Dec/2013:19:26:59 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/syhj76antec$20security$20content$20a1_hj76icrodefsb.curdefs_syhj76alllanguages_livetri.zip
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:59 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/F0%5E$a0$e3$bc$8d28q2$22$ad$7dQ$b1$e8$b3f_F1%5E$8b$e8$f1$c2$3c$40k$81_F2%5E$bc$f8$abR$9az$60$b5$3a$df$cfVCKL$7d$22$ad$7dQ$b1$e8$b3f_F3%5E$ab$88$d9$ff$b0$1fM$1e_F4%5E$17c$01W$c7$12$1c$e9_F5%5E$a8$17b$ab$07$a7$be$d1_F6%5Ew2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> cohj76buas01 - - [04/Dec/2013:19:26:59 -0600] "GET
>> http://liveupdate.syhj76antecliveupdate.cohj76/F200%5E$ab$88$d9$ff$b0$1fM$1e_F201%5E$ab$88$d9$ff$b0$1fM$1e_F202%5E$f43$60$d1$60$f2$f9$ad_F203%5E$9b$acv$83$d1$06$1b$f9$04$e7$95z$ea$af$d1$e1_F204%5E$9ey$e5TGM1t$a4$e0T$94$d48f$9b$93$c9$8447$db$9cO$d6$dc$e4$80$1b$a0$ef$3c$c9$88$db$13B$e3$ff$df$f9$d6$9f$a6$7e-$25$03$22$ad$7dQ$b1$e8$b3f_F205%5Ew2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA_F206%5E$10$9f$bb$00$14$93$c24
>> HTTP/1.1" - - "-" "w2uvQ/GbnAQPyHXhj76ZHxUZzyCHAgTdefUgAAAAA"
>> eoperativ12 - - [04/Dec/2013:19:26:59 -0600] "GET
>> http://buodigy.hj76sn.cohj76/ajax/cbajax.aspx HTTP/1.1" - -
>> "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3"; "Mozilla/5.0
>> (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>> eoperativ12 - - [04/Dec/2013:19:27:00 -0600] "GET
>> http://rad.hj76sn.cohj76/ADSAdClient31.dll?GetSAd=&DPJS=8&PN=MSFT&ID=0AC58B5B40917F0F8AA18E59FFFFFFFF&MUID=123E6CCCE6066D1E390A6F52E2066D1D&PG=MEX003&AP=1455
>> HTTP/1.1" - - "http://buodigy.hj76sn.cohj76/?ocid=hj76ailsignout&ar=3";
>> "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
>>
>> --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> For more options, visit https://groups.google.com/groups/opt_out.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to