On Thu, Aug 28, 2014 at 1:05 PM, velvin <[email protected]> wrote:
> OSSEC newbie here. I am trying to have our OSSEC server fire alerts for
> common authentication failures and other notable windows event logs, pretty
> much out of the box configuration with tweaks to come.
>
> I'm testing authentication failure from one of the target machines (Win7) by
> locking and intentionally entering wrong password. What I see is rule 1002
> (syslog) firing with an alert since it matches one of the default "bad_word"
> list out of the box but I do not see the msauth rule firing additional
> alerts.
>
> What I've done to test is change rule 1002 to look for a bogus word instead
> so it doesn't hit anymore and now I see no rules firing or matching.
>
> Next step was to test it out using the ossec-logtest. Feeding below text
> (copied from the previous alert of rule id 1002) to the test engine shows
> success in firing msauth rule.
>
> ========================
> WinEvtLog: Security: AUDIT_FAILURE(4625):
> Microsoft-Windows-Security-Auditing: (no user): no domain: computername: An
> account failed to log on. Subject:  Security ID:  S-1-5-18  Account Name:
> computername$  Account Domain:  Ourdomain  Logon ID:  0x3e7  Logon Type:   7
> Account For Which Logon Failed:  Security ID:  S-1-0-0  Account Name:
> MyAccountName  Account Domain:  OurDomain  Failure Information:  Failure
> Reason:  %%2313  Status:   0xc000006d  Sub Status:  0xc000006a  Process
> Information:  Caller Process ID: 0x2a0  Caller Process Name:
> C:\Windows\System32\winlogon.exe  Network Information:  Workstation Name:
> ComputerName  Source Network Address: 127.0.0.1  Source Port:  0  Detailed
> Authentication Information:  Logon Process:  User32   Authentication
> Package: Negotiate  Transited Services: -  Package Name (NTLM only): -  Key
> Length:  0  This event is generated when a logon request fails. It is
> generated on the computer where access was attempted.
> ========================
>
> -ommited phase 1 success-
>
> **Phase 2: Completed decoding.
>        decoder: 'windows'
>        status: 'AUDIT_FAILURE'
>        id: '4625'
>        extra_data: 'Microsoft-Windows-Security-Auditing'
>        dstuser: '(no user)'
>        system_name: 'BSS01745b.coh.org'
>
> **Phase 3: Completed filtering (rules).
>        Rule id: '18106'
>        Level: '5'
>        Description: 'Windows Logon Failure.'
> **Alert to be generated.
> ========================
>
> However, the actual alert doesn't get generated in real test. When I change
> Rule ID 1002 back to default (looking for $BAD_WORD) the alert will fire
> again with rule ID 1002 but only with 1002. Any idea why this isn't working?
> How can I troubleshoot further? Thanks.
>


Running that log message through ossec-logtest I get:
[root@localhost ossec-server]# cat /tmp/iii | bin/ossec-logtest
2014/08/28 13:42:44 ossec-testrule: INFO: Reading local decoder file.
2014/08/28 13:42:44 ossec-testrule: INFO: Started (pid: 6836).
ossec-testrule: Type one log per line.



**Phase 1: Completed pre-decoding.
       full event: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
Microsoft-Windows-Security-Auditing: (no user): no domain:
computername: An account failed to log on. Subject:  Security ID:
S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
Process ID: 0x2a0  Caller Process Name:
C:\Windows\System32\winlogon.exe  Network Information:  Workstation
Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
 Detailed Authentication Information:  Logon Process:  User32
Authentication Package: Negotiate  Transited Services: -  Package Name
(NTLM only): -  Key Length:  0  This event is generated when a logon
request fails. It is generated on the computer where access was
attempted.'
       hostname: 'localhost'
       program_name: '(null)'
       log: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
Microsoft-Windows-Security-Auditing: (no user): no domain:
computername: An account failed to log on. Subject:  Security ID:
S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
Process ID: 0x2a0  Caller Process Name:
C:\Windows\System32\winlogon.exe  Network Information:  Workstation
Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
 Detailed Authentication Information:  Logon Process:  User32
Authentication Package: Negotiate  Transited Services: -  Package Name
(NTLM only): -  Key Length:  0  This event is generated when a logon
request fails. It is generated on the computer where access was
attempted.'

**Phase 2: Completed decoding.
       decoder: 'windows'

**Phase 3: Completed filtering (rules).
       Rule id: '18100'
       Level: '0'
       Description: 'Group of windows rules.'


So this makes me wonder what's different between our setups. Which
version of OSSEC are you using?

> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to