Hi,

try with rule 31108.

  <!--
  10.10.10.10 hostname - [25/Feb/2016:10:10:10 -0500] "GET 
//path/path2/requeststringtest.php; HTTP/1.1" 200 Text...
  -->
  <rule id="100060" level="5">
    <if_sid>31108</if_sid>
    <match>requeststringtest.php</match>
    <description>request string test 2</description>
  </rule>


  <rule id="100160" level="5" frequency="5" timeframe="90">
    <if_matched_sid>100060</if_matched_sid>
    <same_source_ip />
    <description>MATCHED request string test 2</description>
  </rule>



10.10.10.10 hostname - [25/Feb/2016:10:10:10 -0500] "GET 
//path/path2/requeststringtest.php; HTTP/1.1" 200 Text...


**Phase 1: Completed pre-decoding.
       full event: '10.10.10.10 hostname - [25/Feb/2016:10:10:10 -0500] 
"GET //path/path2/requeststringtest.php; HTTP/1.1" 200 Text...'
       hostname: 'LinMV'
       program_name: '(null)'
       log: '10.10.10.10 hostname - [25/Feb/2016:10:10:10 -0500] "GET 
//path/path2/requeststringtest.php; HTTP/1.1" 200 Text...'


**Phase 2: Completed decoding.
       decoder: 'web-accesslog'
       srcip: '10.10.10.10'
       url: '//path/path2/requeststringtest.php;'
       id: '200'


**Rule debugging:
    Trying rule: 4 - Generic template for all web rules.
       *Rule 4 matched.
       *Trying child rules.
    Trying rule: 31100 - Access log messages grouped.
       *Rule 31100 matched.
       *Trying child rules.
    Trying rule: 31108 - Ignored URLs (simple queries).
       *Rule 31108 matched.
       *Trying child rules.
    Trying rule: 31166 - Shellshock attack detected
    Trying rule: 31103 - SQL injection attempt.
    



*Trying rule: 100060 - request string test 2       *Rule 100060 matched.    
   *Trying child rules.    Trying rule: 100160 - MATCHED request string 
test 2       *Rule 100160 matched.*


**Phase 3: Completed filtering (rules).
       *Rule id: '100160'*
       Level: '5'
       Description: 'MATCHED request string test 2'
**Alert to be generated.

Regards.
Jesus Linares.

On Thursday, February 25, 2016 at 1:47:10 PM UTC+1, James Culver wrote:
>
> I have added the following rules to local_rules.conf:
>   <rule id="100060" level="5">
>     <if_sid>31100</if_sid>
>     <match>requeststringtest.php</match>
>     <description>request string test 2</description>
>     <options>alert_by_email</options>
>   </rule>
>
>   <rule id="100160" level="7" frequency="5" timeframe="90">
>     <if_matched_sid>100060</if_matched_sid>
>     <same_source_ip />
>     <description>request string test 2</description>
>     <options>alert_by_email</options>
>   </rule>
> but OSSEC doesn't care at all. It counts the rules as being enabled, but 
> no matter how many times or how fast i go to http : // 
> server.ip/whatever?X=requeststringtest.php (or any URL that includes the 
> string), OSSEC completely ignores it. The out of the box rules work fine. 
> If I port scan, ssh or HTTP brute-force, or pull too many 400 or 500 
> errors, then the appropriate rules fire. But this rule doesn't do anything. 
> What am I doing wrong?
>
> OSSEC 2.8.2
> CentOS 6
> Apache
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to