mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
Merge pull request #913 from ryanplasma/master
Update logsources description->definition
This commit is contained in:
commit
b50d234cb5
@ -13,7 +13,7 @@ date: 2020/01/02
|
||||
modified: 2020/03/14
|
||||
logsource:
|
||||
category: webserver
|
||||
description: 'Make sure that your Netscaler appliance logs all kinds of attacks (test with http://your-citrix-gw.net/robots.txt). The directory traversal with ../ might not be needed on certain cloud instances or for authenticated users, so we also check for direct paths. All scripts in portal/scripts are exploitable except logout.pl.'
|
||||
definition: 'Make sure that your Netscaler appliance logs all kinds of attacks (test with http://your-citrix-gw.net/robots.txt). The directory traversal with ../ might not be needed on certain cloud instances or for authenticated users, so we also check for direct paths. All scripts in portal/scripts are exploitable except logout.pl.'
|
||||
detection:
|
||||
selection:
|
||||
c-uri:
|
||||
|
@ -14,7 +14,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
|
@ -14,8 +14,8 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition1: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
|
||||
definition2: 'Requirements: Audit Policy : DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
|
||||
definition: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management,
|
||||
DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 4738
|
||||
|
@ -15,7 +15,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
|
@ -9,7 +9,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
description: 'The advanced audit policy setting "Windows Filtering Platform > Filtering Platform Connection" must be configured for Success'
|
||||
definition: 'The advanced audit policy setting "Windows Filtering Platform > Filtering Platform Connection" must be configured for Success'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5156
|
||||
|
@ -14,7 +14,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
|
@ -12,7 +12,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 5145
|
||||
|
@ -12,7 +12,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 5145
|
||||
|
@ -11,7 +11,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
|
@ -10,7 +10,7 @@ references:
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
description: 'Script block logging must be enabled'
|
||||
definition: 'Script block logging must be enabled'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4104
|
||||
|
@ -15,7 +15,7 @@ date: 2018/11/17
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
description: 'Script block logging must be enabled'
|
||||
definition: 'Script block logging must be enabled'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4104
|
||||
|
@ -10,7 +10,7 @@ references:
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
description: 'Script block logging must be enabled'
|
||||
definition: 'Script block logging must be enabled'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4104
|
||||
|
@ -12,7 +12,7 @@ date: 2020/03/26
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
description: "Script block logging must be enabled"
|
||||
definition: "Script block logging must be enabled"
|
||||
detection:
|
||||
selection:
|
||||
ScriptBlockText|contains:
|
||||
|
@ -323,6 +323,13 @@ class TestRules(unittest.TestCase):
|
||||
self.assertEqual(faulty_rules, [], Fore.RED +
|
||||
"There are rules with non-conform 'title' fields. Please check: https://github.com/Neo23x0/sigma/wiki/Rule-Creation-Guide#title")
|
||||
|
||||
def test_invalid_logsource_attributes(self):
|
||||
faulty_rules = []
|
||||
for file in self.yield_next_rule_file_path(self.path_to_rules):
|
||||
logsource = self.get_rule_part(file_path=file, part_name="logsource")
|
||||
for key in logsource:
|
||||
if key.lower() not in ['category', 'product', 'service', 'definition']:
|
||||
print(Fore.RED + "Rule {} has a logsource with an invalid field ({})".format(file, key))
|
||||
def get_mitre_data():
|
||||
"""
|
||||
Generate tags from live MITRE ATT&CK TAXI service to get up-to-date data
|
||||
|
Loading…
Reference in New Issue
Block a user