/var/ossec/logs/archives/archives.log
file. You will then be able to observe the incoming log generated by your endpoint. After setting this option, restart the manager and check the archives.log file.Note: Don't forget to disable the logall parameter once you have finished troubleshooting. Leaving it enabled could lead to high disk space consumption.Look for if there are any logs inside the relevant archive log. Use grep parameters related to the log.cat /var/ossec/logs/archives/archives.log | grep
Keywoard
Test those logs using log-test to find out if logs are decoded by decodes and rules.--
You received this message because you are subscribed to the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/dbe190e9-a440-4a80-bd4f-b026d89f1e29n%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/2b4dfe2d-94fc-4b6a-bc33-1cdff307d9een%40googlegroups.com.
Good morning Anthony!The timeframe was arbitrary and just as an example. The idea is that the succesful brute force rule triggers if there's been a login after the previous brute force rule triggered.However, I can't really use <if_sid> as (how I understand it) from the documentation, this would immediately run the alert, check if the log's status is "success", which would never trigger since the brute force rule checks for failed attempts.I have also tried with <if_matched_sid> as from the documentation , it mentions that it would trigger if the matched sid triggered in a certain amount of time. But this runs into the same issue I mentioned before of frequency having to be at a minimum, a 2, which would mean 2 brute force attacks would need to happen before this rule triggered.Brute force rule:
<rule id="110005" level="10" frequency="6" timeframe="120">
<if_matched_sid>110001</if_matched_sid>
<decoded_as>synology-connection</decoded_as>
<program_name>Connection</program_name>
<status>fail</status>
<same_srcip/>
<description>[$(hostname)]: Synology brute force attack recipient via the same IP: $(srcip).</description>
<mitre>
<id>T1110</id>
</mitre>
</rule>
"Successful" brute force rule:<rule id="110007" level="12" timeframe="45">
<if_matched_sid>110005</if_matched_sid>
<decoded_as>synology-connection</decoded_as>
<program_name>Connection</program_name>
<status>success</status>
<description>[$(hostname)]: Synology successful brute force attack.</description>
<mitre>
<id>T1110</id>
</mitre>
</rule>
Example log sequence for a brute force attack:Apr 19 14:13:02 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.
Apr 19 14:13:03 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.Apr 19 14:13:04 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.Apr 19 14:13:05 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.Apr 19 14:13:06 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.Apr 19 14:13:07 FILESERVER Connection: User [some.admin] from [10.20.30.40] failed to sign in to [DSM] via [password] due to authorization failure.
Apr 19 14:13:20 FILESERVER Connection: User [some.admin] from [10.20.30.40] signed in to [DSM] successfully via [password].I've also published the decoder and the ruleset (minus the successful brute force one we're discussing here) on github , if you want to have a look at the rest of the rules and the decoder, and also anyone if they find use for it!! :)RegardsOn Wed, May 15, 2024 at 1:09 PM Anthony Faruna <anthony...@wazuh.com> wrote:Hello AltStormThank you for your feedback and patience.Please let me know why you want to put a timeframe of 2 minutes, considering the initial rule already indicates a potential brute-force attack.Based on my understanding, triggering a rule based on the initial rule that detects the brute force attack is sufficient.Please let me know if this helps.Regards
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/79050f14-5c62-4c81-96c5-260d7b9b0219n%40googlegroups.com.