Block Unauthorized Users with Active Response! - Let's Build a Host Intrusion Detection System

  Рет қаралды 2,788

Taylor Walton

Taylor Walton

Күн бұрын

Пікірлер: 15
@marciolima174
@marciolima174 3 жыл бұрын
Can I get an IP with an example that tried to scan the server and put it in the list to block it directly? Or better to configure the rule, in case it is broken does he already activate the answer?
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Marcio, apologies for the late reply. I am having a hard time understanding what you are looking to do. Are you looking to add any IP address that triggers this alert to a CDB list that is contained within a rule to automatically drop any traffic sent from an IP within that list?
@marciolima174
@marciolima174 3 жыл бұрын
@@taylorwalton_socfortress I managed to create an active response for vulnerability scan in rule.id 5706, more for example rule.id 5701 (Exploit Public-Facing Application) MITER ATT & CK - T1190. Do I create the same way? firewall-drop local 007 5706 60 30,60,120
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Marcio, in your example you need to change the tag from local to defined-agent since you only want active response to run on the agent id 007. Other options are described here: documentation.wazuh.com/current/user-manual/reference/ossec-conf/active-response.html#location You can also add multiple rule id within the same active response tag with comma seperation. Taking your example above would enable active response for rules 5706 and 5701: firewall-drop defined-agent 007 5706,5701 60 30,60,120 Hope this helps
@marciolima174
@marciolima174 3 жыл бұрын
@@taylorwalton_socfortress If I want to ban any violation of these rules, can I remove the timeout and repeat_offenders?
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Within the block of the firewall-drop.sh, you would change yes to no documentation.wazuh.com/current/user-manual/capabilities/active-response/remediation-configuration.html
@HouseJunk1e
@HouseJunk1e 3 жыл бұрын
why dont you ever include the links you say will be there? im looking for your initial active response video. :)
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
kzbin.info/www/bejne/l3ybZpSEjc2IY6c :)
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
There should have been a link in the top right of the video, I think it is a small and circled "i" but I will make sure to include mentioned videos in my descriptions going forward Thanks for watching and for the feedback!
@HouseJunk1e
@HouseJunk1e 3 жыл бұрын
@@taylorwalton_socfortress thank you :) love your vids
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Почта - Уральские Пельмени | ЭКСКЛЮЗИВ
9:03
Уральские Пельмени
Рет қаралды 134 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
AASLR: Active Response With Wazuh and OSSEC | Richard Fifarek
42:32
Black Hills Information Security
Рет қаралды 5 М.
Learn Microsoft Active Directory (ADDS) in 30mins
36:26
Andy Malone MVP
Рет қаралды 981 М.
Solving a REAL investigation using OSINT
19:03
Gary Ruddell
Рет қаралды 202 М.
Problems You will Encounter on Linux (and How to Solve Them)
23:01
Rob Braxman Tech
Рет қаралды 154 М.