I suggest to create a CDB list with them, and also create rules to use the
CDB list. For example if the IP is in the CDB list, then trigger an alert
with a higher level. If you want to take it a step further and trigger
action responses then go for it :-)

On Sat, Jul 25, 2015 at 11:06 AM, theresa mic-snare <[email protected]>
wrote:

> Great, thanks for the bash script, Ryan.
> but what else to do after downloading the IP blocklist? how could I feed
> ossec with it?
> maybe through an active-response?
>
> Am Samstag, 25. Juli 2015 04:56:07 UTC+2 schrieb Ryan Schulze:
>>
>>  I played around with IP reputation and CDB a while back, but never
>> pushed it to my live servers. I found the following bash snippet on my test
>> server, it may be of use for someone (although the alienvault list is
>> pretty long and contains different levels of "evil" may be worth parsing
>> and splitting up).
>>
>> #!/bin/bash
>> {
>>   curl "https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist";
>> <https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist> |\
>>   egrep "^[0-9]" | awk '{print $1":ZeuS IP blocklist"}'
>>
>>   curl "https://reputation.alienvault.com/reputation.generic";
>> <https://reputation.alienvault.com/reputation.generic> |\
>>   egrep "^[0-9]" | cut -d, -f1 | sed 's/ # /:/'
>>
>> } > ip_blacklist
>>
>>
>> On 7/24/2015 7:46 PM, Santiago Bassett wrote:
>>
>> Hi Theresa,
>>
>>  my guess is that you are probably victim of web crawlers more than
>> anything else. In any case it would be interesting to search those source
>> IPs info in IP reputation databases to see if those are well known
>> attackers.
>>
>>  Has anyone in this list use an IP reputation database in a CDB list? I
>> would probably try something like that and see how it goes.
>>
>>  Best
>>
>>
>>
>> On Fri, Jul 24, 2015 at 12:32 PM, theresa mic-snare <[email protected]>
>> wrote:
>>
>>> hi folks,
>>>
>>> i need some help with intepreting webserver logfiles (apache logs).
>>> while setting up my ossec-test environment for my thesis project, I've
>>> also setup a wordpress on an apache webserver as a "honeypot". although
>>> there's no real content, except the standard wordpress posts & pages that
>>> comes with the installation, I already have some "visitors". I see these
>>> dubious looking requests. I'm not sure if these are threats/attacks against
>>> my wordpress installation.
>>> I'm not really familiar with apache logs, but I need some
>>> threats/attacks to explain in my thesis. I thought this would be the best
>>> way to get started.
>>>
>>> I have PLENTY of the following requests in my httpd logs
>>>
>>>  Src IP: 115.239.228.8
>>> 115.239.228.8 - - [24/Jul/2015:19:22:42 +0200] "GET
>>> http://zc.qq.com/cgi-bin/common/attr?id=260714&r=0.7636925813952972
>>> HTTP/1.1" 404 292 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT
>>> 6.1; Trident/5.0; 360SE)"
>>>
>>>
>>> Judging by the HTTP status code it's not really a threat, right? it's
>>> probaly just some hacker with a tool who's looking for vulnerabilities? or
>>> is this just nonsense/junk?
>>>
>>>  Received From: tron->/var/log/httpd/access_log
>>> Rule: 31515 fired (level 6) -> "PHPMyAdmin scans (looking for
>>> setup.php)."
>>> Portion of the log(s):
>>>
>>> 178.33.154.144 - - [24/Jul/2015:11:55:15 +0200] "GET
>>> /phpMyAdmin/scripts/setup.php HTTP/1.1" 403 309 "-" "-"
>>>
>>> also this
>>>  Received From: tron->/var/log/httpd/access_log
>>> Rule: 31101 fired (level 5) -> "Web server 400 error code."
>>> Portion of the log(s):
>>>
>>> 202.137.235.243 - - [24/Jul/2015:07:34:11 +0200] "HEAD
>>> /ossec-wui/index.php HTTP/1.1" 401 - "-" "-"
>>>
>>> i'm surprised they found out about it.....glad i protected it with
>>> htaccess and they didn't come in. ;)
>>>
>>> and lots of other requests that return HTTP 403 (forbidden) or 404 (not
>>> found)
>>>
>>> i'm not quite sure what to make of it.
>>> i didn't realise my server was so exposed....did they just find the IP
>>> by scanning for http ports?!
>>>
>>> looking to some feedback,
>>> theresa
>>>  --
>>>
>>> ---
>>> You received this message because you are subscribed to the Google
>>> Groups "ossec-list" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to [email protected].
>>> For more options, visit https://groups.google.com/d/optout.
>>>
>>
>>  --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> For more options, visit https://groups.google.com/d/optout.
>>
>>
>>   --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to