Sorry Martin, got to go out now, but one last suggestion

 

Are you running the web-gui? If so, can you see the level 5 alerts as
they arise? And again can you determine if those alerts are logging the
IP?

 

Andy

 

 

From: ossec-list@googlegroups.com [mailto:ossec-list@googlegroups.com]
On Behalf Of Martin Gottlieb
Sent: Thursday, 28 April 2011 8:13 a.m.
To: ossec-list@googlegroups.com
Subject: Re: [ossec-list] Re: Active Response on Windows events

 


Thanks, that does work.  The problem is that when a real intruder is
triggering my level 5 rule (100245),
it is not recording the source IP, so it has no way of ever triggering
the level 10 rule.  That is what I am
trying to figure out, why the decoder is not working properly "live"
when it works fine using ossec-logtest.

On 4/27/2011 4:01 PM, Andy Cockroft (andic) wrote: 

Hi

 

You should be able to run ossec-logtest repeatedly (ie 6 times at least)
with the same data, and you should see what it does in triggering the
level 10 rule

 

Andy

 

 

From: ossec-list@googlegroups.com [mailto:ossec-list@googlegroups.com]
On Behalf Of Martin Gottlieb
Sent: Thursday, 28 April 2011 7:36 a.m.
To: ossec-list@googlegroups.com
Subject: Re: [ossec-list] Re: Active Response on Windows events

 


good point, I should not be expecting email alerts on the level 5 rule.
But since it's not recording the SrcIP
value, it never triggers the level 10 rule, which I did also create:

  <rule id="100245" level="5">
    <match>Logon Failure</match>
    <group>authentication_failed,</group>
    <description>User authentication failure.</description>
  </rule>

  <rule id="100246" level="10" frequency="5" timeframe="120"
ignore="60">
    <if_matched_sid>100245</if_matched_sid>
    <description>Windows brute force trying to get access to
</description>
    <description>the system.</description>
    <same_source_ip />
    <group>authentication_failures,</group>
  </rule>

So my original question remains, why is it not able to extract the SrcIP
address using the decoder that I created
and verified using ossec-logtest?

Thanks.

Martin


On 4/27/2011 3:27 PM, Andy Cockroft (andic) wrote: 

Hi

 

This is triggering a level 5 alert - will that actually do anything on
your system? Or do you have another rule for multiple occurrences?

 

Certainly for mine, I have a level 10 alert for multiple occurrences
(more than 3) which then activates the response on the windows agent

 

Just a random thought

 

Andy

 

 

From: ossec-list@googlegroups.com [mailto:ossec-list@googlegroups.com]
On Behalf Of Martin Gottlieb
Sent: Thursday, 28 April 2011 1:23 a.m.
To: ossec-list@googlegroups.com
Subject: Re: [ossec-list] Re: Active Response on Windows events

 


Well, I thought I was making progress, but now I'm not so sure.  My
MSSQL decoder has triggered a couple
of active responses, so I believe it is working properly. But, I am not
getting any alerts on windows logon 
failures (I did previously), much less an active response.

I found the following event in my ossec alert log (identifying info
modified):

** Alert 1303837130.3865847: -
syslog,false_positivesauthentication_failed,
2011 Apr 26 12:58:50 (win3) 2.1.1.2->WinEvtLog
Rule: 100245 (level 5) -> 'User authentication failure.'
Src IP: (none)
User: (none)
WinEvtLog: Security: AUDIT_FAILURE(529): Security: SYSTEM: NT AUTHORITY:
WINSERVER: Logon Failure:           Reason:         Unknown user name or
bad password       User Name: ryan         Domain:         WINSERVER
Logon Type: 10          Logon Process: User32           Authentication
Package: Negotiate       Workstation Name: WINSERVER          Caller
User Name: WINSERVER$         Caller Domain: WINDOMAIN          Caller
Logon ID: (0x0,0x3E7)            Caller Process ID: 5716
Transited Services: -           Source Network Address: 7.7.7.226
Source Port: 51287

What's strange is that it does not match the SrcIP or User fields.  When
I run this log entry through ossec-logtest, I get the
following results:

**Phase 2: Completed decoding.
       decoder: 'winevt'
       dstuser: 'ryan'
       srcip: '7.7.7.226'

**Phase 3: Completed filtering (rules).
       Rule id: '100245'
       Level: '5'
       Description: 'User authentication failure.'
**Alert to be generated.

So clearly the winevt decoder is working correctly.  Any ideas as to why
it works in test mode, but not "live"?
Here's the winevt decoder:

<decoder name="winevt">
 
<prematch>^WinEvtLog:\s*Security:\s*AUDIT_FAILURE\(\d+\):\s*Security\.*
Logon Failure: </prematch>
  <regex offset="after_prematch">User Name:\s+(\w+) \.* Source Network
Address:\s+(\d+.\d+.\d+.\d+)</regex>
  <order>user,srcip</order>
</decoder>

I did make a few minor changes since my previous posts, mainly replacing
spaces with "\s*" to allow for multiple white-space characters.

Thanks.

Martin

On 4/25/2011 11:43 AM, Martin Gottlieb wrote: 


Thanks, my ossec server is a router/firewall, my apologies for omitting
this detail.  I was really
just trying to figure out how to get the server to trigger the script(s)
in the first place on the 
windows events, since it was clearly getting notified about the events.

With help from Andy, I believe I have found that the issue boils down to
the decoders.  I think I
have a fix i place now and will be posting a "RESOLVED" message once I
have verified this (just waiting
for someone to attack the server).

Thanks again to everyone who offered help on this.

Martin

On 4/25/2011 11:23 AM, Scott VR wrote: 

It is important to undertstand that firewall-drop.sh script executes
unix/linux commands and the only way that invoking it on the server will
serve any function to protect your windows hosts is if your ossec server
is *also* running as a router/firewall in front of your windows boxes.
If this is the case, it's a pretty major piece of the design that you
left off of your description. If it's not the case, you are going to
need something similar (which I think you alluded to in your inital
email) to the null-route.cmd setup outlined in
http://www.ossec.net/main/manual/manual-active-response-on-windows.

In summary, if your ossec server is also a router for your network, then
running the ipfilters/ipchains/ipsec commands in the firewall-drop.sh
script will work, with the proper regex to obtain srcip. If it is not,
the running this command on the ossec server will have no effect and you
need to run the command on the windows box through its agent.

Cheers,

On Sat, Apr 23, 2011 at 10:27 PM, Martin Gottlieb <mar...@axion-it.net>
wrote:


Hi Andy,

Thanks again for another great piece of advice.  ossec-logtest seems to
confirm that the
regexes are good.  The SQL Server decoder triggers rule 2501, level 5.
I had to add the
following to my local rules to get the winevt decoder to also trigger
2501:

  <rule id="100245" level="5">
    <match>Logon Failure</match>
    <group>authentication_failed,</group>
    <description>User authentication failure.</description>
  </rule>

I think this should to the trick.  Thanks again for your help.

Martin 



On 4/23/2011 5:26 PM, Andy Cockroft (andic) wrote: 

Hi

 

I didn't have that much success with a Regex similar to the one you
wrote, I ended up having to specify everything in a very long-handed way
- as I said perhaps someone could write the decoder far more eloquently
than I - especially constructs such as \.* in the middle of the Regex

 

However, what I did do, is make my changes to the decoder and  run
ossec-logtest - this makes checking the decoder and rules so much easier
without actually affecting production operation

 

Best I can do for now - hope you have your Rules sorted as well -
ossec-logtest will check these at the same time

 

Andy

 

 

From: ossec-list@googlegroups.com [mailto:ossec-list@googlegroups.com]
On Behalf Of Martin Gottlieb
Sent: Sunday, 24 April 2011 3:16 a.m.
To: ossec-list@googlegroups.com
Subject: Re: [ossec-list] Re: Active Response on Windows events

 


Awesome, thanks!  The events I'm seeing generally take 2 forms:

SQL Server Events:

WinEvtLog: Application: AUDIT_FAILURE(18456): MSSQLSERVER: (no user): no
domain: WINSERVER: Login failed for user 'admin'. [CLIENT:
203.81.30.248]


And general Windows Events:

WinEvtLog: Security: AUDIT_FAILURE(529): Security: SYSTEM: NT AUTHORITY:
WINSERVER: Logon Failure:       Reason:        Unknown user name or bad
password     User Name: admin            Domain:        WINSERVER
Logon Type: 10         Logon Process: User32              Authentication
Package: Negotiate     Workstation Name: WINSERVER           Caller User
Name: WINSERVER$          Caller Domain: WINDOMAIN       Caller Logon
ID: (0x0,0x3E7)            Caller Process ID: 532       &am
p;nb
sp; Transi
ted Services: -          Source Network Address: 7.7.7.109
Source Port: 3041    

Would these work as the corresponding decoders:

<decoder name="mssql">
  <prematch>^WinEvtLog: Application: AUDIT_FAILURE\(\d+\): MSSQLSERVER:
\.* Login failed for user</prematch>
  <regex offset="after_prematch">'(\w+)'. [CLIENT:
(\d+.\d+.\d+.\d+)]</regex>
  <order>user,srcip</order>
</decoder>

<decoder name="winevt">
  <prematch>^WinEvtLog: Security: AUDIT_FAILURE\(\d+\): Security\.*
Logon Failure: </prematch>
  <regex offset="after_prematch">User Name: (\w+) \.* Source Network
Address: (\d+.\d+.\d+.\d+)</regex>
  <order>user,srcip</order>
</decoder>

Thanks.

Martin


On 4/22/2011 7:28 PM, AndiC wrote: 

The problem I found was that the Windows decoder in the server /dev/
ossec/etc/decoder.xml does not extract the "srcip", so you have
nothing to work with to block
 
Now this is what I replaced mine with:
 
<decoder name="windows">
  <type>windows</type>
  <prematch>^WinEvtLog: </prematch>
  <regex offset="after_prematch">^\.+: (\w+)\((\d+)\): (\.+): </regex>
  <regex>(\.+): \.+: (\S+):</regex>
  <regex> \.+: \.+: \.+: \.+: \.+: \.+: </regex>
  <regex>\.+: \.+: \.+: \.+: \.+: \.+: \.+: \.+:</regex>
  <regex>\.(\S+)</regex>
  <order>status, id, extra_data, user, system_name, srcip</order>
  <fts>name, location, user, system_name</fts> </decoder>
 
Then, in /dev/ossec/rules/msauth.xml, I replaced rule 18152 with:
 
  <rule id="181521" level="10" frequency="$MS_FREQ" timeframe="240">
    <if_matched_group>win_authentication_failed</if_matched_group>
    <same_source_ip />
    <description>Multiple Windows Logon Failures Same IP.</
description>
    <group>authentication_failures,</group>
  </rule>
  <rule id="181522" level="10" frequency="$MS_FREQ" timeframe="240">
    <if_matched_group>win_authentication_failed</if_matched_group>
    <description>Multiple Windows Logon Failures.</description>
    <group>authentication_failures,</group>
  </rule>
 
I also dropped $MS_FREQ (start of msauth.xml) to 3
 
This works for me, and my Windows clients are well protected.
 
I am sure someone could write a far more eloquent decode Regex - sorry
I'm just coming to grips with that. I'm also uncertain if this will
work against anything other than Server 2003 for which it is written
 
But this is only the decoder that needs some tuning, the rest seems
fine
 
Regards
 
Andy
 
 
On Apr 23, 9:08 am, Martin Gottlieb <mar...@axion-it.net>
<mailto:mar...@axion-it.net>  wrote:

        Shouldn't this block from the config on the OSSEC server:
         
        <active-response>
        <!-- Firewall Drop response. Block the IP for
                - 600 seconds on the firewall (iptables,
                - ipfilter, etc).
               -->
        <command>firewall-drop</command>
        <location>as</location>
        <level>6</level>
        <timeout>3600</timeout>
        </active-response>
         
        cause the firewall drop script to be run on the server for any
event
        that is level 6 or higher, regardless of
        which agent it came from?  That's all I'm trying to accomplish,
I don't
        need anything to run on the Windows
        agent if I can get the firewall drop script to run on the
server.
         
        Thanks.
         
        Martin
         
        On 4/22/2011 4:58 PM, dan (ddp) wrote:
         
         
         

                Hi Martin,

         

                On Fri, Apr 22, 2011 at 4:37 PM, Martin
Gottlieb<mar...@axion-it.net> <mailto:mar...@axion-it.net>   wrote:

                        I guess what I'm trying to understand is this:

         

                        When an event is triggered from a Linux agent,
the firewall drop script is
                        run on the
                        OSSEC server (in addition to the hosts deny
script being called on the
                        agent).  I don't recall
                        doing anything special to make this happen when
I installed OSSEC, I assume
                        it is part of
                        the default behavior.

         

                The default actions (if I'm reading
        
https://bitbucket.org/dcid/ossec-hids/src/4908b28513b0/etc/ossec-serv...
                correctly) is that the script is run on the system where
the log
                message originated.
                Unless you changed the configurations the scripts
shouldn't be running
                on both the server and the agents.

         

                        When an event is triggered on a Windows agent,
the firewall drop script is
                        NOT called on the server,
                        but I would like it to be.  I would like the
default behavior on Windows
                        agents to be the same
                        as Linux agents, at least as far as what happens
on the OSSEC server.  The
                        Windows agent is
                        obviously reporting the event to the server as
it logs it and reports it to
                        me.

         

                        Am I understanding the responses so far to mean
that I have to write a
                        script to make this
                        happen, and that the script needs to reside on
the Windows agent?

         

                        Thanks again.

         

                        Martin

         

                The script would have to reside on all of the systems
you want it to
                run on. Having it run on both Windows and Linux systems
may be
                difficult.- Hide quoted text -

         
        - Show quoted text -

 

 

 

 

 

 

 

Reply via email to