Hello List, I've tried 2 combinations of snort logging and 3 ossec parsers

1) Snort -> alert_full -> ossec[snort-full] = 
[**] [1:5001684:99] E3[rb] BotHunter Malware Windows executable (PE) sent 
from remote host [**]

As you can see there is not SRC/DST IP, and Xref tags, and ID etc., just 
only the useless line above.

2) Snort -> alert_full -> ossec[multi-line:10] =
[**] [1:2100538:17] GPL NETBIOS SMB IPC$ unicode share access [**] 
[Classification: Generic Protocol Command Decode] [Priority: 3] 
08/05-05:35:51.201302 192.168.1.2:4800 -> 192.168.1.6:139 TCP TTL:126 
TOS:0x0 ID:1527 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xFC97B192 Ack: 
0x24EB759C Win: 0xFCE7 TcpLen: 20 [**] [1:2100538:17] GPL NETBIOS SMB IPC$ 
unicode share access [**] [Classification: Generic Protocol Command Decode] 
[Priority: 3] 08/05-05:35:51.505576 192.168.1.2 :4801 -> 192.168.1.6:139 
TCP TTL:126 TOS:0x0 ID:1551 IpLen:20 DgmLen:140 DF

As you can see now, due to different quantity of lines on each alert, we 
got some alerts mixed or truncated, some alerts Has more than one Xref tag, 
so 10 lines for multiline reading is wrong because is fixed.

3) Snort -> alert_fast -> ossec[snort-fast] =
08/05-11:18:55.267293 [**] [1:2101411:12] GPL SNMP public access udp [**] 
[Classification: Attempted Information Leak] [Priority: 2] {UDP} 
10.206.85.168:54872 -> 10.206.91.40:161

It's working, but I really need the full log, sometimes is useful the ID, 
Packet Info and Xref.

Versions: 
Snort: 2.9.2.2 IPv6 GRE (Build 121)
OSSEC: 2.7.1

Snort (alert_full examples)
[**] [1:2100376:8] GPL ICMP_INFO PING Microsoft Windows [**]
[Classification: Misc activity] [Priority: 3] 
08/04-22:24:54.228442 192.168.1.23 -> 192.168.1.25
ICMP TTL:126 TOS:0x0 ID:16644 IpLen:20 DgmLen:60
Type:8  Code:0  ID:512   Seq:16079  ECHO
[Xref => http://www.whitehats.com/info/IDS159]

[**] [1:2100538:17] GPL NETBIOS SMB IPC$ unicode share access [**]
[Classification: Generic Protocol Command Decode] [Priority: 3] 
08/04-22:24:55.610646 192.168.1.28:1257 -> 192.168.1.25:139
TCP TTL:125 TOS:0x0 ID:3584 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xB000F47F  Ack: 0x9A2D4A80  Win: 0xFABA  TcpLen: 20

[**] [1:2103003:7] GPL NETBIOS SMB-DS Session Setup NTMLSSP unicode asn1 
overflow attempt [**]
[Classification: Generic Protocol Command Decode] [Priority: 3] 
08/04-22:24:55.847944 192.168.1.28:1258 -> 192.168.1.25:445
TCP TTL:125 TOS:0x0 ID:3595 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x6BCD86DD  Ack: 0xC26980EC  Win: 0xFF49  TcpLen: 20
[Xref => 
http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx][Xref => 
http://cgi.nessus.org/plugins/dump.php3?id=12065][Xref => 
http://cgi.nessus.org/plugins/dump.php3?id=12052][Xref => 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818][Xref => 
http://www.securityfocus.com/bid/9635][Xref => 
http://www.securityfocus.com/bid/9633]

Does anyone has a tip?

Best regards in advance.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to