SigmaHQ/rules/web/web_multiple_suspicious_resp_codes_single_source.yml
Thomas Patzke 88270fcf2d Rule review and cleanup
* removed unnecessary one element lists from definitions
* converted some lists of one element maps to maps because the resulting
  OR linkage would cause wrong result.
2017-02-15 23:53:08 +01:00

18 lines
469 B
YAML

title: Multiple suspicious Response Codes caused by Single Client
description: Detects possible exploitation activity or bugs in a web application
detection:
selection:
log:
- access.log
- error.log
response:
- 400
- 401
- 403
- 500
condition: selection | count() by clientip > 10
falsepositives:
- Unstable application
- Application that misuses the response codes
level: 40