1) Confirm that you have the list referenced in ossec.conf ie
<list>lists/psexec</list>
2) Create the cdb file with no extension ie vi /var/ossec/lists/psexec
3) Run: /var/ossec/bin/ossec-makelists, it should create a file named
psexec.cdb in the lists folder
MaWhen doing my first CDB list a couple months back I ran into some weird
issues with the ossec-makelists & file extensions... The above are my raw
notes that eventually worked....
-Josh
On Tuesday, March 31, 2015 at 4:52:51 PM UTC-4, Brent Morris wrote:
>
> *Raw Log...*
>
> 2015 Mar 31 11:37:27 WinEvtLog: System: INFORMATION(1): Sysmon: Username:
> SYSTEM-NAME: SYSTEM-NAME: Process Create: UtcTime: 3/31/2015
> 06:37:27.465 PM ProcessGuid: {7531FA7E-E967-551A-0000-0010D2A58706}
> ProcessId: 5868 Image: C:\Folder\Folder\file.exe CommandLine:
> C:\Folder\Folder\file.exe User: DOMAIN\Username LogonGuid:
> {7531FA7E-E963-551A-0000-0020EB238706} LogonId: 0x68723eb
> TerminalSessionId: 1 IntegrityLevel: no level HashType: SHA1
> Hash: 19AF48C6B036E722D74FA00C4E852774236D2F38 ParentProcessGuid:
> {7531FA7E-E965-551A-0000-0010038F8706} ParentProcessId: 476
> ParentImage: C:\Folder\Folder\Parent.exe ParentCommandLine:
> "C:\Folder\Folder\Parent.exe"
>
> *Decoded...*
>
> **Phase 2: Completed decoding.
> decoder: 'windows'
> status: 'C:\Folder\Folder\file.exe'
> dstuser: 'DOMAIN\Username'
> url: '19AF48C6B036E722D74FA00C4E852774236D2F38'
> extra_data: 'C:\Folder\Folder\Parent.exe'
>
> **Phase 3: Completed filtering (rules).
> Rule id: '100242'
> Level: '12'
> Description: 'Unauthorized Process Detected'
> **Alert to be generated.
>
>
> *Rules...*
>
> <rule id="100241" level="0">
> <if_sid>18100</if_sid>
> <list field="url">rules/lists/filelist</list>
> <description>Authorized Process</description>
> </rule>
>
> <rule id="100242" level="12">
> <if_sid>18100</if_sid>
> <list field="url" lookup="not_match_key">rules/lists/filelist</list>
> <description>Unauthorized Process</description>
> </rule>
>
> *CDB file contents...*
>
> 19AF48C6B036E722D74FA00C4E852774236D2F38:file.exe
>
> *Goal:*
>
> I would like to monitor a system for expected behavior and receive alerts
> when unexpected behavior occurs. I have a list of SHA1 hashes of the
> executables as in the CDB file contents above. I simply want an alert when
> there are processes executed from this system outside of its baseline.
>
> *Issue:*
>
> I cannot get a MATCH to work in the CDB. Maybe its something simple and
> I've just been looking at this too long. I've commented out the 100242
> rule and I cannot get 100241 to work.
>
> Much of the documentation supports no file extensions on the cdb lists in
> the ossec.conf and in the rules.xml - although I can find examples where
> people have included extensions...
>
> Maybe something silly I've overlooked? Please... someone slap some sense
> into me!!!
>
> Thank you!
>
>
>
>
>
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.