X-Git-Url: http://ftp.carnet.hr/carnet-debian/scm?a=blobdiff_plain;ds=sidebyside;f=etc%2Frules%2Fweb_rules.xml;h=b35d8995e9cc522f263391e5646ac5d3c12ac743;hb=c41c816a22f0e06f1c2b0a91563f3d9a3bcdb82a;hp=ff185a2d50f3f81c4e54900aa4c9a627b5e818e6;hpb=914feba5d54f979cd5d7e69c349c3d01f630042a;p=ossec-hids.git
diff --git a/etc/rules/web_rules.xml b/etc/rules/web_rules.xml
index ff185a2..b35d899 100755
--- a/etc/rules/web_rules.xml
+++ b/etc/rules/web_rules.xml
@@ -1,4 +1,5 @@
-
-
+ .jpg$|.gif$|favicon.ico$|.png$|robots.txt$|.css$|.js$
+ is_simple_http_request
Ignored extensions on 400 error codes.
@@ -52,39 +54,55 @@
- %027|%00|%01|%7f|%2E%2E|%0A|%0D|../..|..\..|echo;|..
+ %027|%00|%01|%7f|%2E%2E|%0A|%0D|../..|..\..|echo;|..|
cmd.exe|root.exe|_mem_bin|msadc|/winnt/|
- /x90/|default.ida|/sumthin|nsiislog.dll|chmod%|wget%|cd%|
- cat%|exec%|rm%20
+ /x90/|default.ida|/sumthin|nsiislog.dll|chmod%|wget%|cd%20|
+ cat%20|exec%20|rm%20
Common web attack.
attack,
31100
- %3Cscript|%2Fscript|script>|script%3E|SRC=javascript|IMG%20|
+ %3Cscript|%3C%2Fscript|script>|script%3E|SRC=javascript|IMG%20|
%20ONLOAD=|INPUT%20|iframe%20
XSS (Cross Site Scripting) attempt.
attack,
-
+
31103, 31104, 31105
^200
A web attack returned code 200 (success).
attack,
+
+ 31100
+ ?-d|?-s|?-a|?-b|?-w
+ PHP CGI-bin vulnerability attempt.
+ attack,
+
+
+
+ 31100
+ +as+varchar(8000)
+ %2Bchar\(\d+\)%2Bchar\(\d+\)%2Bchar\(\d+\)%2Bchar\(\d+\)%2Bchar\(\d+\)%2Bchar\(\d+\)
+ MSSQL Injection attempt (/ur.php, urchin.js)
+ attack,
+
+
+
31103, 31104, 31105
- ^/search.php?search=|^index.php?searchword=
+ ^/search.php?search=|^/index.php?searchword=
Ignored URLs for the web attacks
-
+
31100
URL too long. Higher than allowed on most
browsers. Possible attack.
@@ -120,11 +138,20 @@
alert_by_email
Web server 503 error code (Service unavailable).
+
+
+
+
+ 31101
+ is_valid_crawler
+ Ignoring google/msn/yahoo bots.
+
+
31101
- Mutiple web server 400 error codes
+ Multiple web server 400 error codes
from same source ip.
web_scan,recon,