<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brute Force GlobalProtect Portal via GP app in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/1236558#M717</link>
    <description>&lt;P&gt;Also see the article as there already existing signatures for this&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000010zEJCAY&amp;amp;lang=en_US" target="_blank"&gt;How to Protect GlobalProtect Portal on NGFW from Brute Force At... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 24 Aug 2025 18:54:25 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2025-08-24T18:54:25Z</dc:date>
    <item>
      <title>Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/536608#M463</link>
      <description>&lt;P&gt;I'm looking for a way to define a custom signature that can detect brute force attempts on the GlobalProtect portal that aren't based on the portal login page. I already have ID 40017 -&amp;nbsp;VPN: Palo Alto Networks SSL VPN Authentication Brute Force Attempt - in place and working fine, however I realized that I'm seeing attacks now where someone has managed to replicate the auth sequence from the GP app itself. I've attempted using the following, but am not having any luck with it detecting my failed attempts:&lt;/P&gt;
&lt;DIV id="tinyMceEditoralexg_8_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alexg_8_3-1679925356788.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49043i5FC340A1728EEB09/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="alexg_8_3-1679925356788.png" alt="alexg_8_3-1679925356788.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alexg_8_2-1679925327162.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49042iF80B6E31A302F25A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="alexg_8_2-1679925327162.png" alt="alexg_8_2-1679925327162.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Wireshark shows a 512 HTTP status code is returned when the auth fails:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alexg_8_4-1679925519836.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49044iDD36ECE05DFE0AC4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="alexg_8_4-1679925519836.png" alt="alexg_8_4-1679925519836.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I'm sure I'm missing something, so please let me know if you spot it or have dealt with this before.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 14:00:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/536608#M463</guid>
      <dc:creator>alexg_8</dc:creator>
      <dc:date>2023-03-27T14:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/537445#M465</link>
      <description>&lt;P&gt;If 512 is returned by the Palo Alto firewall maybe this is an issue why the signature does not work as the response is comming from the control plane.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try selecting transaction not session or as another workaround you can try placing the globalprotect gateway on the loopback interface &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKPCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKPCA0&lt;/A&gt; / &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJHCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJHCA0&lt;/A&gt; as maybe then firewall will match the signature when passing through the reply from the dataplane interface.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 14:08:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/537445#M465</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-04-03T14:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/576067#M497</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just chiming in that we are seeing the same things.&lt;/P&gt;
&lt;P&gt;While it is nice to know that we're not the only ones, it's not nice that it's happening at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Up to 3 attempts per minute.&lt;/P&gt;
&lt;P&gt;Switching IPs after one or two attempts.&lt;BR /&gt;Version showing Browser&lt;BR /&gt;Usernames appear to come from a compiled list.&lt;BR /&gt;Clientless VPN and Portal page disabled.&lt;BR /&gt;SSO and MFA enabled.&lt;/P&gt;
&lt;P&gt;Management won't allow more region blocking than just the usual suspects.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We certainly need a better solution.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 16:01:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/576067#M497</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2024-02-05T16:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/579146#M499</link>
      <description>&lt;P&gt;Seeing the same.&amp;nbsp; Causing GP vpn users to be unable to connect if we leave the GP Portal up.&lt;/P&gt;
&lt;P&gt;Tried setting "Detecting Brute Force Attack on GlobalProtect Portal Page":&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I set the hits frequency for 5 in 60 sec but it does not appear that the profile is triggered so no ips are blocked.&lt;/P&gt;
&lt;P&gt;We restricted region to just US and it did not matter.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 14:57:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/579146#M499</guid>
      <dc:creator>Furio1</dc:creator>
      <dc:date>2024-03-04T14:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/1236556#M716</link>
      <description>&lt;P&gt;If the issue is still there it could be that the palo alto generates the response code itself and an external server (not a transit traffic) so try doing rate limiting only based on the request. Also see&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/how-to-write-palo-alto-networks-custom-vulnerability-and/ta-p/1228494" target="_blank"&gt;How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples&lt;/A&gt;&amp;nbsp;that I have made with usefull examples.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 18:50:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/1236556#M716</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-08-24T18:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Brute Force GlobalProtect Portal via GP app</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/1236558#M717</link>
      <description>&lt;P&gt;Also see the article as there already existing signatures for this&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000010zEJCAY&amp;amp;lang=en_US" target="_blank"&gt;How to Protect GlobalProtect Portal on NGFW from Brute Force At... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 18:54:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/brute-force-globalprotect-portal-via-gp-app/m-p/1236558#M717</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-08-24T18:54:25Z</dc:date>
    </item>
  </channel>
</rss>

