[ossec-list] Re: OSSEC IDS on Windows only sending Error logs

2017-03-07 Thread InfoSec
To gain visibility into what is going on at the agent side, turn on debug mode on the agent. In C:\Program Files (x86)\ossec-agent\internal_options.conf change: # Windows debug (used by the windows agent) windows.debug=0 to # Windows debug (used by the windows agent) windows.debug=2 and restart

Re: [ossec-list] Dynamic values in regex inside OSSEC rules?

2017-03-01 Thread InfoSec
In the Wazuh fork, dynamic decoders are an outstanding idea. It allows unprecedented visualization capabilities in the security console *without* having to resort to further parsing tricks at ingestion time. It is all done in OSSEC. Dynamic decoders enable unprecedented normalization of events.

Re: [ossec-list] Dynamic values in regex inside OSSEC rules?

2017-03-01 Thread InfoSec
Sure thing. I am trying to implement three use cases. 1) Windows event ID: Failed object access attempt by a subject "Subject" (tied to a real user, not a system account) of Object Type: File and object: "C:\Users\Other-than-Subject\Whatever-else comes after.ext". Ten recurrences by same Subje

[ossec-list] Windows agent forwarding twice events to server.

2017-02-26 Thread InfoSec
The Windows agent is forwarding every event *twice* to the ossec server. In debug mode 1, every event that is sent by the agent is accompanied by the following entries in the agent log: 2017/02/26 17:29:14 ossec-agent: WARN: Could not convert SID to string which returned (87) 2017/02/26 17:29:1

[ossec-list] Dynamic values in regex inside OSSEC rules?

2017-02-26 Thread InfoSec
Is it possible to refer to the content of a decoded field by its field name inside a regex in a rule? Example: after decoding an event, we have two fields among several, field1 and field2. The event contains: ... Field1 Label: Content_of_Field1 Field2 Label: Content_of_Field2 Field3 Label:

Re: [ossec-list] Regular OSSEC vs OSSEC Wazuh

2017-02-26 Thread InfoSec
Wazuh fork of OSSEC is OSSEC on *massive doses of steroids*. With ELK to visualize, all it needs on the front-end are: i) A capable, *smart,* *flexible* rule-based correlation engine, with *flexible* alerting capabilities; and ii) A reporting engine (with csv/pdf export, and ad-hoc + automat

[ossec-list] Re: Rewrite output for accesses field in Windows Event 4656

2017-02-26 Thread InfoSec
There a more elegant way: use eventchannel instead of eventlog to collect Windows logs. In /var/ossec/etc/agent.conf: Application eventchannel Security eventchannel System eventchannel The event contains textual descriptions of access codes in a s

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-24 Thread InfoSec
After upgrading Windows 10 to the latest version: - Event ID 6417 is missing the event description and the field names. 2017 Feb 24 12:18:43 WinEvtLog: Security: AUDIT_SUCCESS(6417): Microsoft- Windows-Security-Auditing: (no user): no domain: Hostname: 0x38a0 C:\Windows \System32\wbem\WmiPrvSE.ex

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-23 Thread InfoSec
I found how to run the agent in debug mode. It seems like the issue lies with the agent, and the server is faithfully accepting whatever the agent is sending across. Event ID 8002 (AppLocker) from agent debug log: 2017 Feb 23 16:51:53 WinEvtLog: Microsoft-Windows-AppLocker/EXE and DLL: INFORMAT

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-23 Thread InfoSec
I tend to think that the Windows Agent is the culprit. Can the agent be temporarily run in debug mode, so it logs locally the events that it forwards to the server? -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this g

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-21 Thread InfoSec
The field names. Instead of what is being collected, 2017 Feb 21 13:33:23 WinEvtLog: Security: AUDIT_SUCCESS(4627): Microsoft-Windows-Security-Auditing: (no user): no domain: Hostname: S-1-5-18 HOSTNAME$ DOMAIN 0x3e7 S-1-5-21-XX-XX-XX- Username HOSTNAME 0x22d8dd8 7

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-21 Thread InfoSec
Here's another event missing firld names: Event ID 4627 which lists the group membership of a user when he logs on is missing field names. 2017 Feb 21 13:33:23 WinEvtLog: Security: AUDIT_SUCCESS(4627): Microsoft-Windows-Security-Auditing: (no user): no domain: Hostname: S-1-5-18 HOSTNAME$ DOMAN

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-20 Thread InfoSec
The event is from a Windows 10 system. I have turned on logall. I am having a hard time regenerating event ID 5140, however I have spotted several other event types where the xml field labels are NOT logged up by OSSEC. As presented by OSSEC, these event types (and several others) are just a s

Re: [ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-20 Thread InfoSec
The event is from a Windows 10 system. I have turned on logall. I am having a hard time regenerating event ID 5140, however I have spotted several other event types where the xml field labels are NOT logged up by OSSEC. In addition, in the specific example below, the order of the last two fiel

[ossec-list] Potential Bug: Windows Security Event ID 5140 incorrectly parsed by OSSEC.

2017-02-15 Thread InfoSec
The events are sanitized. *XML in Windows Event Viewer*: - http://schemas.microsoft.com/win/2004/08/events/event";> - 5140 1 0 12808 0 0x8020 2076547748 Security Desktop - S-1-5-21-XX-XX-XX- UserName

[ossec-list] Re: Ignore computer account logon and logoff

2016-10-25 Thread InfoSec
Windows uses a combination of tabs and spaces between fields, and between field names and field content. There is not telling how many of each there are. Using \t*\s* between field name and field content has proven to be bulletproof for me. Example: Account Name:\t*\s*\.+\$ If the $ is follow

[ossec-list] Re: OSSEC csyslogd truncates Windows Security Event ID: 4627.

2016-09-15 Thread InfoSec
Difference between your setup and mine is that I am forwarding events in CEF format, you seem to be forwarding the OSSEC multi-line format. Can you please rerun your test with CEF format in syslog_output? -- --- You received this message because you are subscribed to the Google Groups "ossec

[ossec-list] Re: log_alert_levels versus syslog_output > level?

2016-09-14 Thread InfoSec
Alerts --> Alert level has to do with the event level threshold below which events are dropped and not placed in the alerts file. Syslog --> Level has to do with the event level threshold below which events are not forwarded via csyslogd to syslog receiver. -- --- You received this message be

Re: [ossec-list] OSSEC csyslogd truncates Windows Security Event ID: 4627.

2016-09-14 Thread InfoSec
Regardless of the syslog RFC, they all allow messages up to 1024 bytes. The entire message is 1017 bytes. I think csyslogd is choking on the \r\n\t\t (carriage return, line feed, and two tabs) that precede every group SID. The event is being truncated just before the first \r\n\t\t. I do not k

[ossec-list] OSSEC csyslogd truncates Windows Security Event ID: 4627.

2016-09-14 Thread InfoSec
In /var/ossec/logs/alerts/alerts.json file: {"rule":{"level":1,"comment":"Windows - Audit Success event catch all.","sidid":18104,"firedtimes":2,"groups":["win_audit"]},"dstuser":"(no user)","full_log":"2016 Sep 14 17:25:27 WinEvtLog: Security: AUDIT_SUCCESS(4627): Microsoft-Windows-Security-Au

[ossec-list] How to research "Host-based anomaly detection event (rootcheck)."

2016-03-24 Thread Johnny InfoSec
Greetings :-) Just got this alert, and was wondering if you could provide some specific guidance on how to investigate (step 1, 2, etc.). New to OSSEC. OSSEC HIDS Notification. 2016 Mar 24 7:49:39 Received From: log->rootcheck Rule: 510 fired (level 7) -> "Host-based anomaly detection eve

[ossec-list] XPath Syntax in OSSEC.

2016-03-22 Thread InfoSec
I am trying to understand the exact syntax for XPath filters in OSSEC. All the OSSEC documentation says on the subject is the following, System eventchannel Event/System[EventID=7040] and provides a link to Microsoft's XPath documentation: Can anyone provide detailed guidance on transla

Re: [ossec-list] Need a "decoder ring" for OSSEC

2016-03-15 Thread Johnny InfoSec
PATH=/usr/bin:/usr/local/bin:/bin; export PATH; id; I really appreciate your help. This is all new to me. J~ On Thursday, March 10, 2016 at 4:36:09 AM UTC-6, dan (ddpbsd) wrote: > > > On Mar 10, 2016 5:32 AM, "Johnny InfoSec" > wrote: > > > > Greetings, > &g

[ossec-list] Need a "decoder ring" for OSSEC

2016-03-10 Thread Johnny InfoSec
Greetings, As a new OSSEC user. I have found some of the alerts difficult to make sense of. Is there any documentation (or decoder ring :-)) that helps with this? Trying to make sense of some of the different sections in the below alert: OSSEC HIDS Notification. 2016 Mar 08 21:00:02 Recei

[ossec-list] Is OSSEC used in large scale retail (Point of Sale) systems?

2013-10-24 Thread InfoSec Guy
Can someone give an example of someone in large retail that is successfully using OSSEC? We are looking at solutions for our company of over 50 stores, but I'd like to know that someone else has already tried this in a large environment. Can anyone share links or examples? Thanks! -- ---

[ossec-list] OSSEC in the Enterprise?

2013-10-23 Thread InfoSec Guy
Hello, We are looking to test this in our enterprise environment. Are there any examples or any references to this being used on point of sale devices within large size companies? -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubs