brute forcing windows 11 using wazuh active response

249 views
Skip to first unread message

R Hari

unread,
Sep 11, 2023, 2:54:35 AM9/11/23
to Wazuh | Mailing List
Hello,

environment: three separata VM's as follow: 
wazuh manager: ubuntu 22.04 LTS Server
attacker endpoint: ubuntu 22.04 LTS Server (with hydra installed for ssh brute force attack)
victim endpoint: ubuntu 22.04 LTS Server

I had successfully blocked the attacker endpoint for three minutes, following this link: https://documentation.wazuh.com/current/user-manual/capabilities/active-response/ar-use-cases/blocking-ssh-brute-force.html

This is the result:
Screenshot 2023-08-29 192836.png
Then after three minute timeout:
Screenshot 2023-08-29 192928(markup).png
Now I want to try with a windows 11 VM as the victim endpoint.

This is the result:
windows 11 log on wazuh .png

The when tried attacking again:

A windows 11 in-built software has blocked the attack machine, is my understanding from the below wazuh security log.

windows ssh brute force.png

But I want to block the attack machine using wazuh active repsonse with a timeout of two minutes and tried the same way I had done with the ubuntu victim endpoint. But it does not work at all. Could anyone help me out please?

Harshal Paliwal

unread,
Sep 11, 2023, 5:23:55 AM9/11/23
to Wazuh | Mailing List
Hi Hari

Hope you are doing well today and thank you for using wazuh.
Please follow the steps in this document https://documentation.wazuh.com/current/user-manual/capabilities/active-response/ar-use-cases/blocking-ssh-brute-force.html
while adding Add the <active-response> block below to the Wazuh server /var/ossec/etc/ossec.conf configuration file, please change the timeout from 180 to 120
<ossec_config> <active-response> <command>firewall-drop</command> <location>local</location> <rules_id>5763</rules_id> <timeout>120 </timeout> </active-response> </ossec_config>
The restart the wazuh manager using the following command:
sudo systemctl restart wazuh-manager

Hope this will help. Please feel free to contact us for any information/issues.

Regards
Reply all
Reply to author
Forward
0 new messages