search for: ossec

Displaying 20 results from an estimated 54 matches for "ossec".

2009 Nov 25
1
Puppet custom functions and user permissions
Puppet custom functions and user permissions I am busy writing a custom function to automatically add OSSEC agents to a OSSEC server after installation. Unfortunately, it seems that puppetmasterd is not respecting the entries in /etc/group in linux. No matter how many other groups the puppet user has been added to in /etc/ group, when puppetmasterd runs the custom function the effective/real user always...
2009 Jun 02
0
OSSEC Recipe?
Hi, I''m a fairly new to Puppet but so far have been very pleased with the recipes and my own simple scripts. However, I''ve hit a wall in the form of OSSEC, (http://www.ossec.net/main/) Most of my servers are running ubuntu or debain and neither support OSSEC via apt-get. I''ve thought about setting up my own local repository to handle this and to also package my own puppet updates. However the recommend install of OSSEC is via an interactive...
2009 Nov 28
6
AIDE or OSSEC on CentOS 5.4 x86_64?
Starting with a fresh load and after I finish hardening the load following the Center for Internet Security (CIS) guidance, I'm wondering whether AIDE or OSSEC would be a better intrusion detection system. I installed AIDE and did a quick test of AIDE and after initializing the db and applying the recent cups update, I found that 1700+ files had changed. Those are a lot of changes to wade through to determine if they are legit or not. If that is all tha...
2012 Aug 22
2
Hiera, OSSEC and per-node stuff?
Hi. I have an interesting use case. OSSEC is security tool based on server-client architecture. Server generates keys for agents, and every agent has different key. Now I want to distribute these keys via puppet. I''ve come accross hiera and installed it, and it works superbly, but how to store per-node key in hiera? This is m...
2011 Jun 13
1
Unable to grep 5 mins logs
...pped by the script and append it to another file. However, the below script is not able to grep the desired logs, so I need some help in preparing the script. I am running Centos 5.2 32-bit. for (( i = 5; i >=0; i-- )) ; do grep $(date "+%a %b %d %R %Y" -d "-$i min") /var/ossec/logs/active-responses.log >> /tmp/newlog.log;done /var/ossec/logs/active-responses.log format is below Fri Jun 3 15:38:14 IST 2011 /var/ossec/active-response/bin/host-deny.sh add - 172.31.5.12 1307095694.71353 31151 Fri Jun 3 15:38:14 IST 2011 /var/ossec/active-response/bin/firewall-drop....
2007 Sep 26
4
Intrusion Detection Systems
...that I can't easily control vs. putting strict limits on ssh. We simply have too many users entering from too many networks many with dynamic IP addresses. Enter.... thinking about LIDS or Log Based Intrusion Detection. I've run across four systems. Blockhosts, DenyHosts, fail2ban and OSSEC. DenyHosts apparently only works with ssh, so I've discounted using that. Is anyone using one of these or something else that I've missed. At present, I'm leaning towards OSSEC for several reasons. First it seems very robust. Second, you can set up a server/client structure, so only...
2017 Nov 06
1
How to detect botnet user on the server ?
Another alternative is to use a FIMS/HIDS such as Aide (Advanced Intrusion Detection Environment), OSSEC or Samhain. Be prepared to learn a lot about what your OS normally does behind the scenes (and thus a fair amount of initial fine tuning to exclude those things). Aide seems to work well (I've seen only one odd result) and is quite granular. However, it is local system based rather than cent...
2010 Aug 18
3
Playing with sipvicious ..
... using it as a tool and understanding what it does... So one part of it's toolset identifys valid SIP accounts - and I was under the impression that alwaysauthreject=yes was supposed to stop this... However, it sends a request for a highly probably non-existent account, then sends requests for probably existing accounts and I guess compares the results - account not found vs. bad
2007 Aug 16
1
meaning and cause of kernel panic ??
...x216 Aug 15 23:01:28 mydomain kernel: eax: 00000000 ebx: c54ee0e0 ecx: ffffffff edx: 00000000 Aug 15 23:01:28 mydomain kernel: esi: c54ee0e4 edi: 00000000 ebp: c1be11e4 esp: c48f8f60 Aug 15 23:01:28 mydomain kernel: ds: 007b es: 007b ss: 0068 Aug 15 23:01:28 mydomain kernel: Process ossec-syscheckd (pid: 11762, threadinfo=c48f8000 task=c75a27e0) Aug 15 23:01:28 mydomain kernel: Stack: bff7125c c7ff5420 c0180d15 c48f8fa0 c717f920 c0372960 c717f920 c7f2b8b0 Aug 15 23:01:28 mydomain kernel: c0180d15 c018097e c48f8fa0 ffffffda 0856a5dc c717f920 00000000 c0180fcb Aug 15 23:01:28 m...
2017 Nov 06
2
How to detect botnet user on the server ?
Hello guys, Whats is the best way to identify a possible user using a botnet with php in the server? And if he is using GET commands for example in other server. Does apache logs outbound conections ? If it is using a file that is not malicious the clam av would not identify. Thanks
2006 Nov 01
1
Constant regeneration of /etc/ssh/ssh_known_hosts
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I''ve created an ssh_keys class that just makes sure that all my Puppet managed hosts get the same set of hosts keys using the "sshkey" type. I also am starting to play with OSSEC HIDS which is a host based intrusion detection system. OSSEC HIDS has been letting me know that the MD5 and SHA1 hashes of /etc/ssh/ssh_known_hosts has been changing regularly as Puppet runs. Now, I''ve not added or changed anything with my ssh keys so I would expect either: a) it sees...
2010 Mar 04
8
Intrusion Detection
Hello all, I have been exploring the various intrusion detection systems available for the Linux platform and was wondering what ones you all would recommend? I have used AIDE before and while it is extremely easy to setup, it does not support the ability to send alerts as files are changed (allows one to be aware of an intrusion almost immediately). Thank you, Dan Burkland ?
2012 May 25
4
PCI/DSS compliance on CentOS
I have a client project to implement PCI/DSS compliance. The PCI/DSS auditor has stipulated that the web server, application middleware (tomcat), the db server have to be on different systems. In addition the auditor has also stipulated that there be a NTP server, a "patch" server, The Host OS on all of the above nodes will be CentOS 6.2. Below is a list of things that would be
2013 Jun 20
2
init.d scripts not starting at boot
...e specific example is crond; Chkconfig output: crond 0:off 1:off 2:on 3:on 4:on 5:on 6:off permissions in init.d: -rwxr-xr-x 1 root root 2793 Jul 18 2011 crond The processes that aren't loading are; Clamd, directadmin, exim, freshclam, httpd, mysqld, ossec, proftpd, sshguard Any ideas what I need to check/change to resolve this problem? Thanks everyone!
2019 Nov 14
0
how to know when a system is compromised
This is one where there's probably no limit to what you could do. We have a high-security environment and are using Aide and OSSEC. Aide has been good at reporting file system changes and is very granular, the dilemma is what to monitor and what to ignore (keep from being inundated with reports of innocuous changes at the risk of missing something). However, it is not daemon-based so changes between runs which are undone go...
2011 Jul 26
3
file2ban
I want to add an entry to a database every time a brute force registration attempt is done. from this database we are updating cisco routers with our ban list so our entire network is protected. The database side of things is working and has been for some time. I really would like to add the file2ban side of it to protect our asterisk system better. How would I best go about doing this
2019 Nov 14
4
how to know when a system is compromised
How do you know when a Linux system has been compromised?? Every day I watch our systems with all the typical tools, ps, top, who, I watch firewall / IPS logs, I have logwatch setup and mailing daily summaries to me and I dive deeper into logs if something looks suspicious. What am I missing or not looking at that you security gurus are looking at? I subscribe to the centos and SANS
2010 Feb 10
3
saslauthd attack
...be a kiddie script. Mostly trying to access several of our servers with the username anna. All failed... in fact I don't think we have a user anna on any of our servers. Meanwhile... I'm running Sendmail. This pertains to Centos 4 and 5 servers. I'm also running fail2ban on some and Ossec on others. So far, no blocking is being done. When I look at the logs all I find is under messages and here is a sample: Feb 10 05:23:08 neptune saslauthd[3370]: do_auth : auth failure: [user=anna] [service=smtp] [realm=] [mech=shadow] [reason=Unknown] Feb 10 05:23:25 neptune saslauthd[...
2018 Dec 15
7
CentOS 7.5 Linux box got infected with Watchbog malware
Hi, Is there a way to find out how the CentOS 7.5 Linux box got infected with malware? Currently i am referring to http://sudhakarbellamkonda.blogspot.com/2018/11/blocking-watchbog-malwareransomware.html to carry out the below steps and is done manually. 1)rm -fr /tmp/*timesyncc.service* 2)crontab -e -u apigee delete the cron entry */1 * * * * (curl -fsSL https://pastebin.com/raw/aGTSGJJp||wget
2007 Oct 04
2
Internet threat management package
... Looking for a recommendation for a commercial threat management package. ( Think antivirus / antispy / anti-rootkit -- all rolled into one engine ), similar to this product: http://usa.kaspersky.com/products_services/work-space-security.php, which currently only supports one kernel for FC6, and RHEL4, officially. Here's the background. Need to make a decision and investment for a