Great, thanks for the bash script, Ryan.
but what else to do after downloading the IP blocklist? how could I feed
ossec with it?
maybe through an active-response?
Am Samstag, 25. Juli 2015 04:56:07 UTC+2 schrieb Ryan Schulze:
>
> I played around with IP reputation and CDB a while back, but never
> pushed it to my live servers. I found the following bash snippet on my test
> server, it may be of use for someone (although the alienvault list is
> pretty long and contains different levels of "evil" may be worth parsing
> and splitting up).
>
> #!/bin/bash
> {
> curl "https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist"
> <https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist> |\
> egrep "^[0-9]" | awk '{print $1":ZeuS IP blocklist"}'
>
> curl "https://reputation.alienvault.com/reputation.generic"
> <https://reputation.alienvault.com/reputation.generic> |\
> egrep "^[0-9]" | cut -d, -f1 | sed 's/ # /:/'
>
> } > ip_blacklist
>
>
> On 7/24/2015 7:46 PM, Santiago Bassett wrote:
>
> Hi Theresa,
>
> my guess is that you are probably victim of web crawlers more than
> anything else. In any case it would be interesting to search those source
> IPs info in IP reputation databases to see if those are well known
> attackers.
>
> Has anyone in this list use an IP reputation database in a CDB list? I
> would probably try something like that and see how it goes.
>
> Best
>
>
>
> On Fri, Jul 24, 2015 at 12:32 PM, theresa mic-snare < <javascript:>
> [email protected] <javascript:>> wrote:
>
>> hi folks,
>>
>> i need some help with intepreting webserver logfiles (apache logs).
>> while setting up my ossec-test environment for my thesis project, I've
>> also setup a wordpress on an apache webserver as a "honeypot". although
>> there's no real content, except the standard wordpress posts & pages that
>> comes with the installation, I already have some "visitors". I see these
>> dubious looking requests. I'm not sure if these are threats/attacks against
>> my wordpress installation.
>> I'm not really familiar with apache logs, but I need some threats/attacks
>> to explain in my thesis. I thought this would be the best way to get
>> started.
>>
>> I have PLENTY of the following requests in my httpd logs
>>
>> Src IP: 115.239.228.8
>> 115.239.228.8 - - [24/Jul/2015:19:22:42 +0200] "GET
>> http://zc.qq.com/cgi-bin/common/attr?id=260714&r=0.7636925813952972
>> HTTP/1.1" 404 292 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT
>> 6.1; Trident/5.0; 360SE)"
>>
>>
>> Judging by the HTTP status code it's not really a threat, right? it's
>> probaly just some hacker with a tool who's looking for vulnerabilities? or
>> is this just nonsense/junk?
>>
>> Received From: tron->/var/log/httpd/access_log
>> Rule: 31515 fired (level 6) -> "PHPMyAdmin scans (looking for
>> setup.php)."
>> Portion of the log(s):
>>
>> 178.33.154.144 - - [24/Jul/2015:11:55:15 +0200] "GET
>> /phpMyAdmin/scripts/setup.php HTTP/1.1" 403 309 "-" "-"
>>
>> also this
>> Received From: tron->/var/log/httpd/access_log
>> Rule: 31101 fired (level 5) -> "Web server 400 error code."
>> Portion of the log(s):
>>
>> 202.137.235.243 - - [24/Jul/2015:07:34:11 +0200] "HEAD
>> /ossec-wui/index.php HTTP/1.1" 401 - "-" "-"
>>
>> i'm surprised they found out about it.....glad i protected it with
>> htaccess and they didn't come in. ;)
>>
>> and lots of other requests that return HTTP 403 (forbidden) or 404 (not
>> found)
>>
>> i'm not quite sure what to make of it.
>> i didn't realise my server was so exposed....did they just find the IP by
>> scanning for http ports?!
>>
>> looking to some feedback,
>> theresa
>> --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected] <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected] <javascript:>.
> For more options, visit https://groups.google.com/d/optout.
>
>
>
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.