I found it...

the issue was that I prepended a / ossec.conf <list>

bad
<list>*/*lists/filename</list>

good!
<list>lists/filename</list>


Thanks for your help!

On Tuesday, March 31, 2015 at 3:05:32 PM UTC-7, DefensiveDepth wrote:

> 1) Confirm that you have the list referenced in ossec.conf  ie 
> <list>lists/psexec</list>
>
> 2) Create the cdb file with no extension ie vi /var/ossec/lists/psexec
> 3) Run: /var/ossec/bin/ossec-makelists, it should create a file named 
> psexec.cdb in the lists folder
>
> MaWhen doing my first CDB list a couple months back I ran into some weird 
> issues with the ossec-makelists & file extensions...  The above are my raw 
> notes that eventually worked....
>
> -Josh
>
>
>
> On Tuesday, March 31, 2015 at 4:52:51 PM UTC-4, Brent Morris wrote:
>>
>> *Raw Log...*
>>
>> 2015 Mar 31 11:37:27 WinEvtLog: System: INFORMATION(1): Sysmon: Username: 
>> SYSTEM-NAME: SYSTEM-NAME: Process Create:      UtcTime: 3/31/2015 
>> 06:37:27.465 PM      ProcessGuid: {7531FA7E-E967-551A-0000-0010D2A58706}   
>>    ProcessId: 5868      Image: C:\Folder\Folder\file.exe      CommandLine: 
>> C:\Folder\Folder\file.exe       User: DOMAIN\Username      LogonGuid: 
>> {7531FA7E-E963-551A-0000-0020EB238706}      LogonId: 0x68723eb     
>>  TerminalSessionId: 1      IntegrityLevel: no level      HashType: SHA1     
>>  Hash: 19AF48C6B036E722D74FA00C4E852774236D2F38      ParentProcessGuid: 
>> {7531FA7E-E965-551A-0000-0010038F8706}      ParentProcessId: 476     
>>  ParentImage: C:\Folder\Folder\Parent.exe      ParentCommandLine: 
>> "C:\Folder\Folder\Parent.exe"
>>
>> *Decoded...*
>>
>> **Phase 2: Completed decoding.
>>        decoder: 'windows'
>>        status: 'C:\Folder\Folder\file.exe'
>>        dstuser: 'DOMAIN\Username'
>>        url: '19AF48C6B036E722D74FA00C4E852774236D2F38'
>>        extra_data: 'C:\Folder\Folder\Parent.exe'
>>
>> **Phase 3: Completed filtering (rules).
>>        Rule id: '100242'
>>        Level: '12'
>>        Description: 'Unauthorized Process Detected'
>> **Alert to be generated.
>>
>>
>> *Rules...*
>>
>> <rule id="100241" level="0">
>>   <if_sid>18100</if_sid>
>>   <list field="url">rules/lists/filelist</list>
>>   <description>Authorized Process</description>
>> </rule>
>>
>> <rule id="100242" level="12">
>>   <if_sid>18100</if_sid>
>>   <list field="url" lookup="not_match_key">rules/lists/filelist</list>
>>   <description>Unauthorized Process</description>
>> </rule>
>>
>> *CDB file contents...*
>>
>> 19AF48C6B036E722D74FA00C4E852774236D2F38:file.exe
>>
>> *Goal:*
>>
>> I would like to monitor a system for expected behavior and receive alerts 
>> when unexpected behavior occurs.  I have a list of SHA1 hashes of the 
>> executables as in the CDB file contents above.  I simply want an alert when 
>> there are processes executed from this system outside of its baseline.
>>
>> *Issue:*  
>>
>> I cannot get a MATCH to work in the CDB.  Maybe its something simple and 
>> I've just been looking at this too long.  I've commented out the 100242 
>> rule and I cannot get 100241 to work.  
>>
>> Much of the documentation supports no file extensions on the cdb lists in 
>> the ossec.conf and in the rules.xml - although I can find examples where 
>> people have included extensions...
>>
>> Maybe something silly I've overlooked?  Please... someone slap some sense 
>> into me!!! 
>>
>> Thank you!
>>
>>
>>
>>
>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to