December 2017
Intermediate to advanced
410 pages
11h 5m
English
The features of log monitoring and active response make OSSEC very unique and powerful.
In order to understand how this works, I have created a server in AWS with the firewall rule of 0.0.0.0/0. As expected, within 10 minutes, I found hundreds of brute force attempts on my server.
Here is a sample of log files containing brute force attempts:
Jun 17 15:17:42 ip-10-61-0-195 sshd[7951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.197.232.107Jun 17 15:17:44 ip-10-61-0-195 sshd[7951]: Failed password for invalid user 0000 from 91.197.232.107 port 39455 ssh2Jun 17 15:17:44 ip-10-61-0-195 sshd[7951]: Connection closed by 91.197.232.107 [preauth]Jun 17 15:17:44 ip-10-61-0-195 ...
Read now
Unlock full access