2 - Official "attack" correlation rules for OSSEC.
4 - Copyright (C) 2009 Trend Micro Inc.
7 - This program is a free software; you can redistribute it
8 - and/or modify it under the terms of the GNU General Public
9 - License (version 2) as published by the FSF - Free Software
12 - License details: http://www.ossec.net/en/licensing.html
16 <!-- System users. They should never log in to the system -->
17 <var name="SYS_USERS">^apache$|^mysql$|^www$|^nobody$|^nogroup$|^portmap$|^named$|^rpc$|^mail$|^ftp$|^shutdown$|^halt$|^daemon$|^bin$|^postfix$|^shell$|^info$|^guest$|^psql$|^user$|^users$|^console$|^uucp$|^lp$|^sync$|^sshd$|^cdrom$|^ossec$</var>
20 <!-- Attack signatures -->
21 <group name="syslog,attacks,">
22 <rule id="40101" level="12">
23 <if_group>authentication_success</if_group>
24 <user>$SYS_USERS</user>
25 <description>System user successfully logged to the system.</description>
26 <group>invalid_login,</group>
29 <rule id="40102" level="14">
30 <regex>^rpc.statd[\d+]: gethostbyname error for \W+</regex>
31 <description>Buffer overflow attack on rpc.statd</description>
32 <group>exploit_attempt,</group>
35 <rule id="40103" level="14">
36 <regex>ftpd[\d+]: \S+ FTP LOGIN FROM \.+ 0bin0sh</regex>
37 <description>Buffer overflow on WU-FTPD versions prior to 2.6</description>
38 <group>exploit_attempt,</group>
41 <rule id="40104" level="13">
42 <match>?????????????????????</match>
43 <description>Possible buffer overflow attempt.</description>
44 <group>exploit_attempt,</group>
47 <rule id="40105" level="12">
48 <match>changed by \(\(null\)</match>
49 <description>"Null" user changed some information.</description>
50 <group>exploit_attempt,</group>
53 <rule id="40106" level="12">
54 <match>@@@@@@@@@@@@@@@@@@@@@@@@@</match>
55 <description>Buffer overflow attempt (probably on yppasswd).</description>
56 <group>exploit_attempt,</group>
59 <rule id="40107" level="14">
60 <regex>cachefsd: Segmentation Fault - core dumped</regex>
61 <description>Heap overflow in the Solaris cachefsd service.</description>
62 <info type='cve'>2002-0033</info>
63 <group>exploit_attempt,</group>
66 <rule id="40109" level="12">
67 <match>attempt to execute code on stack by</match>
68 <description>Stack overflow attempt or program exiting </description>
69 <description>with SEGV (Solaris).</description>
70 <info type="link">http://snap.nlc.dcccd.edu/reference/sysadmin/julian/ch18/389-392.html</info>
71 <group>exploit_attempt,</group>
74 <rule id="40111" level="10" frequency="10" timeframe="160">
75 <if_matched_group>authentication_failed</if_matched_group>
76 <description>Multiple authentication failures.</description>
77 <group>authentication_failures,</group>
80 <rule id="40112" level="12" timeframe="240">
81 <if_group>authentication_success</if_group>
82 <if_matched_group>authentication_failures</if_matched_group>
84 <description>Multiple authentication failures followed </description>
85 <description>by a success.</description>
88 <rule id="40113" level="12" frequency="6" timeframe="360">
89 <if_matched_group>virus</if_matched_group>
90 <description>Multiple viruses detected - Possible outbreak.</description>
94 </group> <!-- SYSLOG, ATTACKS, -->
98 <!-- Privilege scalation messages -->
99 <group name="syslog,elevation_of_privilege,">
100 <rule id="40501" level="15" timeframe="300" frequency="2">
101 <if_group>adduser</if_group>
102 <if_matched_group>attacks</if_matched_group>
103 <description>Attacks followed by the addition </description>
104 <description>of an user.</description>
106 </group> <!-- SYSLOG, ELEVATION_OF_PRIVILEGE, -->
110 <!-- Scan signatures -->
111 <group name="syslog,recon,">
112 <rule id="40601" level="10" frequency="10" timeframe="90" ignore="90">
113 <if_matched_group>connection_attempt</if_matched_group>
114 <description>Network scan from same source ip.</description>
116 <info type="link">http://project.honeynet.org/papers/enemy2/</info>
118 </group> <!-- SYSLOG,SCANS -->