On Thu, Aug 28, 2014 at 1:48 PM, dan (ddp) <[email protected]> wrote:
> On Thu, Aug 28, 2014 at 1:05 PM, velvin <[email protected]> wrote:
>> OSSEC newbie here. I am trying to have our OSSEC server fire alerts for
>> common authentication failures and other notable windows event logs, pretty
>> much out of the box configuration with tweaks to come.
>>
>> I'm testing authentication failure from one of the target machines (Win7) by
>> locking and intentionally entering wrong password. What I see is rule 1002
>> (syslog) firing with an alert since it matches one of the default "bad_word"
>> list out of the box but I do not see the msauth rule firing additional
>> alerts.
>>
>> What I've done to test is change rule 1002 to look for a bogus word instead
>> so it doesn't hit anymore and now I see no rules firing or matching.
>>
>> Next step was to test it out using the ossec-logtest. Feeding below text
>> (copied from the previous alert of rule id 1002) to the test engine shows
>> success in firing msauth rule.
>>
>> ========================
>> WinEvtLog: Security: AUDIT_FAILURE(4625):
>> Microsoft-Windows-Security-Auditing: (no user): no domain: computername: An
>> account failed to log on. Subject:  Security ID:  S-1-5-18  Account Name:
>> computername$  Account Domain:  Ourdomain  Logon ID:  0x3e7  Logon Type:   7
>> Account For Which Logon Failed:  Security ID:  S-1-0-0  Account Name:
>> MyAccountName  Account Domain:  OurDomain  Failure Information:  Failure
>> Reason:  %%2313  Status:   0xc000006d  Sub Status:  0xc000006a  Process
>> Information:  Caller Process ID: 0x2a0  Caller Process Name:
>> C:\Windows\System32\winlogon.exe  Network Information:  Workstation Name:
>> ComputerName  Source Network Address: 127.0.0.1  Source Port:  0  Detailed
>> Authentication Information:  Logon Process:  User32   Authentication
>> Package: Negotiate  Transited Services: -  Package Name (NTLM only): -  Key
>> Length:  0  This event is generated when a logon request fails. It is
>> generated on the computer where access was attempted.
>> ========================
>>
>> -ommited phase 1 success-
>>
>> **Phase 2: Completed decoding.
>>        decoder: 'windows'
>>        status: 'AUDIT_FAILURE'
>>        id: '4625'
>>        extra_data: 'Microsoft-Windows-Security-Auditing'
>>        dstuser: '(no user)'
>>        system_name: 'BSS01745b.coh.org'
>>
>> **Phase 3: Completed filtering (rules).
>>        Rule id: '18106'
>>        Level: '5'
>>        Description: 'Windows Logon Failure.'
>> **Alert to be generated.
>> ========================
>>
>> However, the actual alert doesn't get generated in real test. When I change
>> Rule ID 1002 back to default (looking for $BAD_WORD) the alert will fire
>> again with rule ID 1002 but only with 1002. Any idea why this isn't working?
>> How can I troubleshoot further? Thanks.
>>
>
>
> Running that log message through ossec-logtest I get:
> [root@localhost ossec-server]# cat /tmp/iii | bin/ossec-logtest
> 2014/08/28 13:42:44 ossec-testrule: INFO: Reading local decoder file.
> 2014/08/28 13:42:44 ossec-testrule: INFO: Started (pid: 6836).
> ossec-testrule: Type one log per line.
>
>
>
> **Phase 1: Completed pre-decoding.
>        full event: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
> Microsoft-Windows-Security-Auditing: (no user): no domain:
> computername: An account failed to log on. Subject:  Security ID:
> S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
> Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
> Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
> OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
> 0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
> Process ID: 0x2a0  Caller Process Name:
> C:\Windows\System32\winlogon.exe  Network Information:  Workstation
> Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
>  Detailed Authentication Information:  Logon Process:  User32
> Authentication Package: Negotiate  Transited Services: -  Package Name
> (NTLM only): -  Key Length:  0  This event is generated when a logon
> request fails. It is generated on the computer where access was
> attempted.'
>        hostname: 'localhost'
>        program_name: '(null)'
>        log: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
> Microsoft-Windows-Security-Auditing: (no user): no domain:
> computername: An account failed to log on. Subject:  Security ID:
> S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
> Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
> Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
> OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
> 0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
> Process ID: 0x2a0  Caller Process Name:
> C:\Windows\System32\winlogon.exe  Network Information:  Workstation
> Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
>  Detailed Authentication Information:  Logon Process:  User32
> Authentication Package: Negotiate  Transited Services: -  Package Name
> (NTLM only): -  Key Length:  0  This event is generated when a logon
> request fails. It is generated on the computer where access was
> attempted.'
>
> **Phase 2: Completed decoding.
>        decoder: 'windows'
>
> **Phase 3: Completed filtering (rules).
>        Rule id: '18100'
>        Level: '0'
>        Description: 'Group of windows rules.'
>
>
> So this makes me wonder what's different between our setups. Which
> version of OSSEC are you using?
>


Never mind, figured out why my results were way different. Here's what
I get now:

**Phase 1: Completed pre-decoding.
       full event: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
Microsoft-Windows-Security-Auditing: (no user): no domain:
computername: An account failed to log on. Subject:  Security ID:
S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
Process ID: 0x2a0  Caller Process Name:
C:\Windows\System32\winlogon.exe  Network Information:  Workstation
Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
 Detailed Authentication Information:  Logon Process:  User32
Authentication Package: Negotiate  Transited Services: -  Package Name
(NTLM only): -  Key Length:  0  This event is generated when a logon
request fails. It is generated on the computer where access was
attempted.'
       hostname: 'localhost'
       program_name: '(null)'
       log: 'WinEvtLog: Security: AUDIT_FAILURE(4625):
Microsoft-Windows-Security-Auditing: (no user): no domain:
computername: An account failed to log on. Subject:  Security ID:
S-1-5-18  Account Name:  computername$  Account Domain:  Ourdomain
Logon ID:  0x3e7  Logon Type:   7  Account For Which Logon Failed:
Security ID:  S-1-0-0  Account Name:  MyAccountName  Account Domain:
OurDomain  Failure Information:  Failure Reason:  %%2313  Status:
0xc000006d  Sub Status:  0xc000006a  Process Information:  Caller
Process ID: 0x2a0  Caller Process Name:
C:\Windows\System32\winlogon.exe  Network Information:  Workstation
Name: ComputerName  Source Network Address: 127.0.0.1  Source Port:  0
 Detailed Authentication Information:  Logon Process:  User32
Authentication Package: Negotiate  Transited Services: -  Package Name
(NTLM only): -  Key Length:  0  This event is generated when a logon
request fails. It is generated on the computer where access was
attempted.'

**Phase 2: Completed decoding.
       decoder: 'windows'
       status: 'AUDIT_FAILURE'
       id: '4625'
       extra_data: 'Microsoft-Windows-Security-Auditing'
       dstuser: '(no user)'
       system_name: 'computername'

**Phase 3: Completed filtering (rules).
       Rule id: '18138'
       Level: '7'
       Description: 'Logon Failure - Account locked out.'
**Alert to be generated.

Do you have rule id 18138?

>> --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to