<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMTP Brute Force - different source IPs in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/517869#M444</link>
    <description>&lt;P&gt;If you managed to get the needed answers, please flag the question as answered.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2022 21:19:53 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2022-10-13T21:19:53Z</dc:date>
    <item>
      <title>SMTP Brute Force - different source IPs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/511443#M435</link>
      <description>&lt;P&gt;The scenario I am seeing is SMTP brute force attempts against a username, but each time the source IP address is different, I guess they are using a botnet.&amp;nbsp; Exchange will tarpit the IP for 30 seconds for the failed authentication, but it doesn't matter as the next attempt comes from a different IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone suggest a custom signature, or modification to the existing smtp signature to stop these types of attempts (blacklist the IP).&amp;nbsp; The accounts eventually lock out as a result.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second scenario is login attempts against usernames that no longer exist... I'd love to maintain a list of ex-employees and then blacklist any IP which tries to authenticate against one of them.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 13:56:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/511443#M435</guid>
      <dc:creator>cenders</dc:creator>
      <dc:date>2022-08-10T13:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Brute Force - different source IPs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/512824#M436</link>
      <description>&lt;P&gt;I have not done this for SMTP just for HTTP with web form authentication where I matched based on parameter name and the server login page response content (Successful or Failed) but maybe with the context "smtp-req-protocol-payload" you can match the "&lt;CODE class=""&gt;AUTH LOGIN" command and after that you will need to check the SMTP response that if it has message like "auth failed" or "user does not exist".&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/smtp-req-protocol-payload" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/smtp-req-protocol-payload&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/smtp-rsp-content" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/smtp-rsp-content&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more about SMTP auth maybe see:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mailtrap.io/blog/smtp-auth/" target="_blank" rel="noopener"&gt;https://mailtrap.io/blog/smtp-auth/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also after you have matched the correct smtp reqest body with the auth command and the smtp response you will need to make combination signature to block the ip address if it gets the SMTP response for failed auth after maybe 5 attempts in 30 minutes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV style="display: inline;"&gt;Under
&lt;DIV style="display: inline;"&gt;Time Attributespecify the following:
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;DIV class="" data-label="ADDITIONAL INFORMATION"&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV style="display: inline;"&gt;
&lt;UL&gt;
&lt;LI class=""&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV class=""&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV style="display: inline;"&gt;Number of Hits—Specify the threshold that will trigger any policy-based action as a number of hits (1-1000) in a specified number of seconds (1-3600).&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class=""&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV class=""&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV style="display: inline;"&gt;Aggregation Criteria—Specify whether the hits are tracked by source IP address, destination IP address, or a combination of source and destination IP addresses.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class=""&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV class=""&gt;
&lt;DIV style="display: inline;"&gt;To move a condition within a group, select the condition and click
&lt;DIV style="display: inline;"&gt;Move Upor
&lt;DIV style="display: inline;"&gt;Move Down.
&lt;DIV style="display: inline;"&gt;&amp;nbsp;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;-------
&lt;DIV style="display: inline;"&gt;&amp;nbsp;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;For Aggregation Criteria select source IP and take a look at:&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/about-custom-threat-signatures/combination-signatures-for-brute-force-attacks" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/about-custom-threat-signatures/combination-signatures-for-brute-force-attacks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also better the signature be with scope session as we want to match smtp request command and smtp response payload. Maybe see the link below to get the idea:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSOCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSOCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;CODE class=""&gt;&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 12:28:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/512824#M436</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-08-24T12:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Brute Force - different source IPs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/517869#M444</link>
      <description>&lt;P&gt;If you managed to get the needed answers, please flag the question as answered.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 21:19:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/517869#M444</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-10-13T21:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Brute Force - different source IPs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/517885#M445</link>
      <description>&lt;P&gt;Sorry, I'm slow... I haven't had time to investigate your proposed solution.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 22:47:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/517885#M445</guid>
      <dc:creator>cenders</dc:creator>
      <dc:date>2022-10-13T22:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Brute Force - different source IPs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/520041#M448</link>
      <description>&lt;P&gt;I may soon create a POST with an example for Brute Force match on HTTP web page web form that can help you out with the SMTP stuff as I also became interested in the results &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 18:36:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-brute-force-different-source-ips/m-p/520041#M448</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-11-02T18:36:44Z</dc:date>
    </item>
  </channel>
</rss>

