Good example! Definitely helpful! Thanks!

One thing, I know I read about it somewhere, but how do I group my entries 
in the local_rules file to make them fire. Say for example that I would 
like to change the behavior of the 31008 rule with an exception? Will go 
back through the collection of links to see if I can figure it out :) Also, 
saw some interesting stuff on how to  track connecting devices (dhcp) 
through MAC-addresses -- obviously unrelated to IIS logs though ;)

Best regards,
Fredrik

On Thursday, February 11, 2016 at 12:25:33 AM UTC+1, Brent Morris wrote:
>
> eesh... hotkeys got away from me and I posted too fast.
>
> Sure..
>
> You can do some active response stuff on ID 400... That's fun to do!
>
> For me personally, I took a fingerprint of all the web vulnerability 
> scanners and made it into a CDB list.  This was from Nexpose, OpenVAS, and 
> a pilfered some extras from old logs...  put those all in a CDB list and 
> added a rule.
>
> Local_rules.xml
>
> <rule id="184780" level="12">
>   <if_sid>31100</if_sid>
>   <list field="url">lists/urlblacklist</list>
> <description>Web Vulnerability Scanner Detected</description>
> </rule>
> ---
> ossec.config
>
> <ossec_config>
>   <rules>
>   <list>lists/urlblacklist</list>
> ....
>
> then 
>   <active-response>
>     <command>firewall-drop</command>
>     <location>server</location>
>     <rules_id>31100</rules_id>
>     <timeout>300</timeout>
>  </active-response>
>
> ---
>
> sample content of urlblacklist (it's a long file)
>
> /bblog/xmlrpc.php -:17
> /scripts/root.exe -:17
> /msadc/msadcs.dll -:17
> /cgi-bin/test-cgi -:17
> /cgi-bin/htsearch -:17
> /CFIDE/adminiapi/ -:17
> /cgi-bin/faxquery -:17
> /CFIDE/scheduler/ -:17
> /CFIDE/websocket/ -:17
> /common/index.jsf -:17
> /cgi-bin/home.tcl -:17
> /bblog/xmlrpc.php -:17
> /cfdocs/index.htm -:17
>
> ---------------------
>
> Now you can detect and block those pesky web vulnerability scanners.... 
>  You'll have to connect the active response to your actual firewall and 
> configure the script accordingly.  And you'll likely have some samples of 
> web scanners if you have a web server connected to the net.  We get scanned 
> all the time...
>
> And you could block repeat 404 errors too...
>
> This isn't a complete tutorial; you'll need to read up on creating CDB 
> lists, and compiling them.  You'll also need to get active response 
> working.  And, ALWAYS test it when you're done so you can be sure you're 
> blocking those pesky scanners but not blocking valid traffic.  One wrong 
> URL in that CDB list and OSSEC suddenly turns on you and bites.  And one 
> wrong character on a line can be the difference between a hit and a miss.
>
> HTH!!!
>
>
>
>
> On Wednesday, February 10, 2016 at 3:15:49 PM UTC-8, Brent Morris wrote:
>>
>> Sure..
>>
>> You can do some active response stuff on ID 400... That's fun to do!
>>
>> For me personally, I took a fingerprint of all the web vulnerability 
>> scanners and made it into a CDB list.  This was from Nexpose, OpenVAS, and 
>> a pilfered some extras from old logs...  put those all in a CDB list and 
>> added a rule.
>>
>> Local_rules.xml
>>
>> <rule id="184780" level="12">
>>   <if_sid>31100</if_sid>
>>   <list field="url">lists/urlblacklist</list>
>> <description>Web Vulnerability Scanner Detected</description>
>> </rule>
>>
>> ossec.config
>>
>> <ossec_config>
>>
>>
>>
>>
>> On Tuesday, February 9, 2016 at 1:24:24 PM UTC-8, Fredrik wrote:
>>>
>>> Hi Brent,
>>>
>>>
>>> Just mentioned in post to Jesus that I have been (still am) learning as 
>>> I go :) Your recommendation to stick with the three fields url, srcip and 
>>> ID makes sense in my case as well. I noticed that the logging settings in 
>>> IIS7.5 looks somewhat different, but as expected all options were not 
>>> checked in this server's configuration. 
>>>
>>> Regarding the alerts, I'm more trying to set up a few samples to see 
>>> what I can catch. Do you have any recommendations of things to try? Maybe 
>>> one for requests resulting in ID 400?
>>>
>>> Best regards,
>>> Fredrik 
>>>
>>> On Monday, February 8, 2016 at 9:24:18 PM UTC+1, Brent Morris wrote:
>>>>
>>>> Fredrik,
>>>>
>>>> The stuff you cooked up has some issues.  If you want those fields 
>>>> extracted and were going to use them for alerts, I'd go with Jesus' 2nd 
>>>> recommendation.  It's a good expansion of the default IIS logging decoders 
>>>> from the OSSEC git repository.
>>>>
>>>> If you change your logging per the OSSEC instructions, I don't believe 
>>>> that his recommended decoder will work and the built-in decoder will 
>>>> trigger.  Which by default, only pulls out the url, srcip and ID.  It 
>>>> doesn't get the destip, port and action.  I've found the srcip, URL, and 
>>>> ID 
>>>> to be the most valuable.  If you had a large farm or servers with multiple 
>>>> addresses, I can see why destip would be useful.... Or the action (IIS 
>>>> verb).  Give us a little more background as to what problem you're trying 
>>>> to solve and I'm sure we can help you further :)
>>>>
>>>> -Brent
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Saturday, February 6, 2016 at 12:04:53 PM UTC-8, Fredrik wrote:
>>>>>
>>>>> Guys! Thanks both for taking the time to respond! So, if I understand 
>>>>> this correctly I could use default IIS logging and go with Jesus 
>>>>> suggestion 
>>>>> - this would require updating the OSSEC binaries though, correct? as you 
>>>>> suggest Brent, having a look at the logging settings in IIS makes sense 
>>>>> regardless. Provided I'm able to update the logging, what decoder 
>>>>> settings 
>>>>> should I use? Go with Jesus', or is the stuff I cooked up worth pursuing? 
>>>>>
>>>>> Thanks again!
>>>>>
>>>>> Best regards,
>>>>> Fredrik 
>>>>>
>>>>> On Thursday, February 4, 2016 at 9:05:09 PM UTC+1, Brent Morris wrote:
>>>>>>
>>>>>> In order to get OSSEC to work with IIS logs, you have to basically 
>>>>>> enable all the Extended logging options...  Be sure to check the "use 
>>>>>> local 
>>>>>> time for file naming and rollover" - otherwise your OSSEC will be dark 
>>>>>> for 
>>>>>> a few hours while it catches up with IIS's GMT time.
>>>>>>
>>>>>>
>>>>>> http://ossec-docs.readthedocs.org/en/latest/manual/monitoring/file-log-monitoring.html
>>>>>>  
>>>>>> - scroll down from there to see the screen shots.
>>>>>>
>>>>>> Jesus' recommendation is a change committed in the next release of 
>>>>>> the version of OSSEC.  You could add that to your local_decoder.xml if 
>>>>>> you 
>>>>>> wanted.  We put that in there as a catch-all for the IIS logs still in 
>>>>>> default mode.  But it's can't hurt to turn up the logging in IIS me 
>>>>>> thinks.
>>>>>>
>>>>>>
>>>>>> On Wednesday, February 3, 2016 at 12:59:25 PM UTC-8, Fredrik wrote:
>>>>>>>
>>>>>>> Hi All,
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Gone through a few threads about decoders for IIS. I'm just getting 
>>>>>>> started and, so far, have only managed easy stuff. I'm trying to 
>>>>>>> extract 
>>>>>>> the fields mentioned in decoder from the log entry using the decoder 
>>>>>>> below, 
>>>>>>> but the logtester still give the result below. What am I missing this 
>>>>>>> time 
>>>>>>> :)
>>>>>>>
>>>>>>> FULL LOG ENTRY:
>>>>>>> 2016-02-02 08:45:31 10.32.10.14 GET /images/logo2.png - 80 - 
>>>>>>> 10.32.5.145 
>>>>>>> Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.3;+WOW64;+Trident/7.0;+Touch;+.NET4.0E;+.NET4.0C;+.NET+CLR+3.5.30729;+.NET+CLR+2.0.50727;+.NET+CLR+3.0.30729;+Tablet+PC+2.0)
>>>>>>>  
>>>>>>> 200 0 0 15
>>>>>>>
>>>>>>> LOGTEST RESULTS:
>>>>>>> **Phase 1: Completed pre-decoding.
>>>>>>>        full event: '2016-02-02 08:45:31 10.46.10.101 GET 
>>>>>>> /images/logo2.png - 80 - 10.46.5.145 
>>>>>>> Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.3;+WOW64;+Trident/7.0;+Touch;+.NET4.0E;+.NET4.0C;+.NET+CLR+3.5.30729;+.NET+CLR+2.0.50727;+.NET+CLR+3.0.30729;+Tablet+PC+2.0)
>>>>>>>  
>>>>>>> 200 0 0 15'
>>>>>>>        hostname: 'sto-lab99'
>>>>>>>        program_name: '(null)'
>>>>>>>        log: '2016-02-02 08:45:31 10.46.10.101 GET /images/logo2.png 
>>>>>>> - 80 - 10.46.5.145 
>>>>>>> Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.3;+WOW64;+Trident/7.0;+Touch;+.NET4.0E;+.NET4.0C;+.NET+CLR+3.5.30729;+.NET+CLR+2.0.50727;+.NET+CLR+3.0.30729;+Tablet+PC+2.0)
>>>>>>>  
>>>>>>> 200 0 0 15'
>>>>>>>
>>>>>>> **Phase 2: Completed decoding.
>>>>>>>        decoder: 'windows-date-format'
>>>>>>>
>>>>>>> DECODER:
>>>>>>> <decoder name="web-accesslog-iis"> 
>>>>>>>   <parent>windows-date-format</parent> 
>>>>>>>   <type>web-log</type> 
>>>>>>>   <use_own_name>true</use_own_name> 
>>>>>>>    <regex offset="after_parent">^\d+-\d+-\d+ \d+:\d+:\d+ (\S+) (\S+) 
>>>>>>> - (\S+) - (\d+.\d+.\d+.\d+) </regex> 
>>>>>>>    <order>srcip, action, url, srcip, dstport</order> 
>>>>>>> </decoder> 
>>>>>>>
>>>>>>> Best,
>>>>>>> Fredrik 
>>>>>>>
>>>>>>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to