Looking to take these logs from two seperate server applications and
perform alerts and possibly responses to them.
server 1:
2016-05-26 15:45:47 172.18.2.247 POST /wfc/portal - 443 - 10.18.100.24
Mozilla/5.0+(Windows+NT+6.3;+WOW64;+rv:39.0)+Gecko/20100101+Firefox/39.0
200 0 0 15
2016-05-26 15:38:15 172.18.2.247 GET /wff - 443 - 10.18.100.24
Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/50.0.2661.102+Safari/537.36
404 0 2 203
Server 2:
2016-05-26 00:16:02 W3SVC1071858006 192.168.1.30 POST
/servlet/Router/Transaction/Erp - 80 - 10.13.100.4
Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.1;+WOW64;+Trident/7.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+Media+Center+PC+6.0;+InfoPath.3)
200 0 0
2016-05-26 00:16:03 W3SVC1071858006 192.168.1.30 GET
/lawson/portal/drill/drsearch.css - 80 - 10.12.100.10
Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.1;+WOW64;+Trident/5.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+Media+Center+PC+6.0;+InfoPath.3)
404 0 2
Right now I am just attempting to work with logs from Server1: to alert on
200 & 4040 errors for for web scans and alike but a beginning.
Entry in local_decoder.xml:
<decoder name="kronos-web">
<parent>windows-date-format</parent>
<use_own_name>true</use_own_name>
<prematch offset="after_parent">^\d+.\d+.\d+.\d+ GET |^\d+.\d+.\d+.\d+
POST </prematch>
<regex offset="after_prematch">(\S+ \S*) \.* (\d+.\d+.\d+.\d+) \S*\.*
(\d\d\d) \S+ \S+ \S+</regex>
<order>url,srcip,id</order>
</decoder>
Entry in local_rules.xml
<group name="kronos-web,syslog,">
<rule id="100007" level="0">
<decoded_as>kronos-web</decoded_as>
<description>Grouping for Kronos web rules.</description>
</rule>
<rule id="100008" level="5">
<if_sid>100007</if_sid>
<id>404</id>
<description>IIS 7 Web Server 404 Error.</description>
<group>connection attempt,</group>
</rule>
<rule id="100009" level="5">
<if_sid>100007</if_sid>
<id>200</id>
<description>IIS 7 Web Server 200 Error.</description>
<group>connection attempt,</group>
</rule>
<rule id="100010" level="10" frequency="10" timeframe="60">
<if_matched_sid>100008,100009</if_matched_sid>
<description>Possible Kronos Web Scan/Attack Detected.</description>
<group>attacks,</group>
</rule>
</group>
When I run the logtest is get this output that I am getting the url,srcip
and id.. but is not getting to the rules I have created above...
**Phase 1: Completed pre-decoding.
full event: '2016-05-26 15:45:47 172.18.2.247 POST /wfc/portal - 443
- 10.18.100.24
Mozilla/5.0+(Windows+NT+6.3;+WOW64;+rv:39.0)+Gecko/20100101+Firefox/39.0
200 0 0 15'
hostname: 'alamo'
program_name: '(null)'
log: '2016-05-26 15:45:47 172.18.2.247 POST /wfc/portal - 443 -
10.18.100.24
Mozilla/5.0+(Windows+NT+6.3;+WOW64;+rv:39.0)+Gecko/20100101+Firefox/39.0
200 0 0 15'
**Phase 2: Completed decoding.
decoder: 'windows-date-format'
url: '/wfc/portal -'
srcip: '10.18.100.24'
id: '200'
Am I missing something like a base idea behind this or a syntax thing I
really do not know...
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.