<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom signature needed to detect &amp;quot;invalid username&amp;quot; response to a brute force login attempt (is it possible?) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31053#M22723</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please also consider posting this question in the DevCenter community:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/space/2010"&gt;DevCenter&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This community is for users to share custom content such as custom signatures, scripts etc. Participants in DevCenter may be able to shed more light on what additional tuning may be needed to your custom signature (which context, what pattern etc) to match the stream in question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Mar 2014 17:57:21 GMT</pubDate>
    <dc:creator>goku123</dc:creator>
    <dc:date>2014-03-04T17:57:21Z</dc:date>
    <item>
      <title>Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31049#M22719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm new to Palo Alto and custom threat signatures. I'm trying to detect invalid login attempts to a web site and apply a time rate. When the user enters an invalid username in the login, the site returns the text "invalid username". Which context would I use to search for this pattern match? I read the "Creating Custom Signatures" document, but it created more questions and I can't seem to find any deeper documentation. By using that document, I was able to use the wordpress brute force combination signature they included (monitoring http POST to wp-login.php), but I have some users that trip those thresholds often because they log into many blogs simultaneously on one server. I'm looking for something a little more granular (not just login attempts (good or bad), but bad attempts based on the site returning the text "bad password", or "invalid username". Is this possible? I don't mind reading more documentation regarding custom signatures if it's available, I've just not seen any other documents yet that give an example like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 06:41:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31049#M22719</guid>
      <dc:creator>itmgr</dc:creator>
      <dc:date>2014-03-04T06:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31050#M22720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;pcap&lt;/SPAN&gt; file taken at client or server and try to find a matching signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1367"&gt;Trigger Conditions for Brute Force Signatures&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 07:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31050#M22720</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-03-04T07:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31051#M22721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did take a pcap of the exchange between client and server. I see the text in the pcap, but still not sure which context to use to search for the string. The client sends an http POST to wp-login.php, and then the server issues an http 200 response and then the "Invalid username" text comes a few packets later. Below is the TCP stream from the pcap that contains the "Invalid username" text. I've tried the http_rsp_headers and file_html_body contexts, but still unable to match the text in the exchange. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;POST /login/ HTTP/1.1&lt;/P&gt;&lt;P&gt;Host: www.mysite.com&lt;/P&gt;&lt;P&gt;Connection: keep-alive&lt;/P&gt;&lt;P&gt;Content-Length: 164&lt;/P&gt;&lt;P&gt;Cache-Control: max-age=0&lt;/P&gt;&lt;P&gt;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Origin: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com"&gt;http://www.mysite.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.146 Safari/537.36&lt;/P&gt;&lt;P&gt;Content-Type: application/x-www-form-urlencoded&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Referer: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/login/"&gt;http://www.mysite.com/login/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Accept-Encoding: gzip,deflate,sdch&lt;/P&gt;&lt;P&gt;Accept-Language: en-US,en;q=0.8&lt;/P&gt;&lt;P&gt;Cookie: wlp_post_protection=1; PHPSESSID=gh0pdah82shb6les906pc5n4u7; __utma=74238163.586482511.1393824836.1393824836.1393824836.1; __utmc=74238163; __utmz=74238163.1393824836.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=217530694.1368975606.1393822044.1393822044.1393886113.2; __utmc=217530694; __utmz=217530694.1393822044.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); wfvt_345498598=531583af83045; wordpress_test_cookie=WP+Cookie+check&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;log=ed&amp;amp;pwd=ed&amp;amp;cptch_result=87Q%3D&amp;amp;cptch_time=1393918888&amp;amp;cptch_number=6&amp;amp;wp-submit=Log+In&amp;amp;redirect_to=http%3A%2F%2Fwww.mysite.com%2Fwp-admin%2F&amp;amp;testcookie=1HTTP/1.1 200 OK&lt;/P&gt;&lt;P&gt;Date: Tue, 04 Mar 2014 07:44:02 GMT&lt;/P&gt;&lt;P&gt;Server: Apache/2.2.15 (CentOS)&lt;/P&gt;&lt;P&gt;X-Powered-By: PHP/5.3.3&lt;/P&gt;&lt;P&gt;Set-Cookie: wfvt_345498598=5315844284ba8; expires=Tue, 04-Mar-2014 08:14:02 GMT; path=/&lt;/P&gt;&lt;P&gt;Expires: Thu, 19 Nov 1981 08:52:00 GMT&lt;/P&gt;&lt;P&gt;Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0&lt;/P&gt;&lt;P&gt;Pragma: no-cache&lt;/P&gt;&lt;P&gt;Set-Cookie: wordpress_test_cookie=WP+Cookie+check; path=/&lt;/P&gt;&lt;P&gt;X-Frame-Options: SAMEORIGIN&lt;/P&gt;&lt;P&gt;Content-Length: 4373&lt;/P&gt;&lt;P&gt;Connection: close&lt;/P&gt;&lt;P&gt;Content-Type: text/html; charset=UTF-8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;!DOCTYPE html&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;!--[if IE 8]&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;html xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.w3.org/1999/xhtml"&gt;http://www.w3.org/1999/xhtml&lt;/A&gt;&lt;SPAN&gt;" class="ie8" lang="en-US"&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;![endif]--&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;!--[if !(IE &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; ]&amp;gt;&amp;lt;!--&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;html xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.w3.org/1999/xhtml"&gt;http://www.w3.org/1999/xhtml&lt;/A&gt;&lt;SPAN&gt;" lang="en-US"&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;!--&amp;lt;![endif]--&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;head&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;title&amp;gt;mysite www &amp;amp;rsaquo; Log In&amp;lt;/title&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;link rel='stylesheet' id='open-sans-css'&amp;nbsp; href='//fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400italic%2C600italic%2C300%2C400%2C600&amp;amp;#038;subset=latin%2Clatin-ext&amp;amp;#038;ver=3.8.1' type='text/css' media='all' /&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;link rel='stylesheet' id='dashicons-css'&amp;nbsp; href='&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-includes/css/dashicons.min.css?ver=3.8.1"&gt;http://www.mysite.com/wp-includes/css/dashicons.min.css?ver=3.8.1&lt;/A&gt;&lt;SPAN&gt;' type='text/css' media='all' /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;link rel='stylesheet' id='wp-admin-css'&amp;nbsp; href='&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-admin/css/wp-admin.min.css?ver=3.8.1"&gt;http://www.mysite.com/wp-admin/css/wp-admin.min.css?ver=3.8.1&lt;/A&gt;&lt;SPAN&gt;' type='text/css' media='all' /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;link rel='stylesheet' id='buttons-css'&amp;nbsp; href='&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-includes/css/buttons.min.css?ver=3.8.1"&gt;http://www.mysite.com/wp-includes/css/buttons.min.css?ver=3.8.1&lt;/A&gt;&lt;SPAN&gt;' type='text/css' media='all' /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;link rel='stylesheet' id='colors-fresh-css'&amp;nbsp; href='&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-admin/css/colors.min.css?ver=3.8.1"&gt;http://www.mysite.com/wp-admin/css/colors.min.css?ver=3.8.1&lt;/A&gt;&lt;SPAN&gt;' type='text/css' media='all' /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;!--[if lte IE 7]&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;link rel='stylesheet' id='ie-css'&amp;nbsp; href='&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-admin/css/ie.min.css?ver=3.8.1"&gt;http://www.mysite.com/wp-admin/css/ie.min.css?ver=3.8.1&lt;/A&gt;&lt;SPAN&gt;' type='text/css' media='all' /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;![endif]--&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;meta name='robots' content='noindex,follow' /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;script type="text/javascript"&amp;gt;&lt;/P&gt;&lt;P&gt;addLoadEvent = function(func){if(typeof jQuery!="undefined")jQuery(document).ready(func);else if(typeof wpOnload!='function'){wpOnload=func;}else{var oldonload=wpOnload;wpOnload=function(){oldonload();func();}}};&lt;/P&gt;&lt;P&gt;function s(id,pos){g(id).left=pos+'px';}&lt;/P&gt;&lt;P&gt;function g(id){return document.getElementById(id).style;}&lt;/P&gt;&lt;P&gt;function shake(id,a,d){c=a.shift();s(id,c);if(a.length&amp;gt;0){setTimeout(function(){shake(id,a,d);},d);}else{try{g(id).position='static';wp_attempt_focus();}catch(e){}}}&lt;/P&gt;&lt;P&gt;addLoadEvent(function(){ var p=new Array(15,30,15,0,-15,-30,-15,0);p=p.concat(p.concat(p));var i=document.forms[0].id;g(i).position='relative';shake(i,p,20);});&lt;/P&gt;&lt;P&gt;&amp;lt;/script&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/head&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;body class="login login-action-login wp-core-ui"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;div id="login"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;h1&amp;gt;&amp;lt;a href="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://wordpress.org/"&gt;http://wordpress.org/&lt;/A&gt;&lt;SPAN&gt;" title="Powered by WordPress"&amp;gt;mysite www&amp;lt;/a&amp;gt;&amp;lt;/h1&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;div id="login_error"&amp;gt; &amp;lt;strong&amp;gt;ERROR&amp;lt;/strong&amp;gt;: Invalid username. &amp;lt;a href="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/login/?action=lostpassword"&gt;http://www.mysite.com/login/?action=lostpassword&lt;/A&gt;&lt;SPAN&gt;" title="Password Lost and Found"&amp;gt;Lost your password&amp;lt;/a&amp;gt;?&amp;lt;br /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/div&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;form name="loginform" id="loginform" action="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/login/"&gt;http://www.mysite.com/login/&lt;/A&gt;&lt;SPAN&gt;" method="post"&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;label for="user_login"&amp;gt;Username&amp;lt;br /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="text" name="log" id="user_login" class="input" value="" size="20" /&amp;gt;&amp;lt;/label&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;label for="user_pass"&amp;gt;Password&amp;lt;br /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="password" name="pwd" id="user_pass" class="input" value="" size="20" /&amp;gt;&amp;lt;/label&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;p class="cptch_block"&amp;gt;&amp;lt;br /&amp;gt; &amp;lt;input type="hidden" name="cptch_result" value="hIE=" /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="hidden" name="cptch_time" value="1393919042" /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="hidden" value="Version: 2.4" /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 &amp;amp;#43; on&amp;amp;#101; =&amp;nbsp; &amp;lt;input id="cptch_input" type="text" autocomplete="off" name="cptch_number" value="" maxlength="2" size="2" aria-required="true" required="required" style="margin-bottom:0;display:inline;font-size: 12px;width: 40px;" /&amp;gt; &amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;br /&amp;gt; &amp;lt;p class="forgetmenot"&amp;gt;&amp;lt;label for="rememberme"&amp;gt;&amp;lt;input name="rememberme" type="checkbox" id="rememberme" value="forever"&amp;nbsp; /&amp;gt; Remember Me&amp;lt;/label&amp;gt;&amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;p class="submit"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="submit" name="wp-submit" id="wp-submit" class="button button-primary button-large" value="Log In" /&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;input type="hidden" name="redirect_to" value="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/wp-admin/"&gt;http://www.mysite.com/wp-admin/&lt;/A&gt;&lt;SPAN&gt;" /&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;input type="hidden" name="testcookie" value="1" /&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/form&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;p id="nav"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;a href="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/login/?action=lostpassword"&gt;http://www.mysite.com/login/?action=lostpassword&lt;/A&gt;&lt;SPAN&gt;" title="Password Lost and Found"&amp;gt;Lost your password?&amp;lt;/a&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;script type="text/javascript"&amp;gt;&lt;/P&gt;&lt;P&gt;function wp_attempt_focus(){&lt;/P&gt;&lt;P&gt;setTimeout( function(){ try{&lt;/P&gt;&lt;P&gt;d = document.getElementById('user_login');&lt;/P&gt;&lt;P&gt;if( d.value != '' )&lt;/P&gt;&lt;P&gt;d.value = '';&lt;/P&gt;&lt;P&gt;d.focus();&lt;/P&gt;&lt;P&gt;d.select();&lt;/P&gt;&lt;P&gt;} catch(e){}&lt;/P&gt;&lt;P&gt;}, 200);&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if(typeof wpOnload=='function')wpOnload();&lt;/P&gt;&lt;P&gt;&amp;lt;/script&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;lt;p id="backtoblog"&amp;gt;&amp;lt;a href="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.mysite.com/"&gt;http://www.mysite.com/&lt;/A&gt;&lt;SPAN&gt;" title="Are you lost?"&amp;gt;&amp;amp;larr; Back to mysite www&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/div&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;div class="clear"&amp;gt;&amp;lt;/div&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/body&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/html&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 16:55:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31051#M22721</guid>
      <dc:creator>itmgr</dc:creator>
      <dc:date>2014-03-04T16:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31052#M22722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd recommend create a rule in vulnerability protection object with category set to brute-force and action set to drop-all-packets.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 17:47:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31052#M22722</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-03-04T17:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31053#M22723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please also consider posting this question in the DevCenter community:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/space/2010"&gt;DevCenter&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This community is for users to share custom content such as custom signatures, scripts etc. Participants in DevCenter may be able to shed more light on what additional tuning may be needed to your custom signature (which context, what pattern etc) to match the stream in question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 17:57:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31053#M22723</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2014-03-04T17:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Custom signature needed to detect "invalid username" response to a brute force login attempt (is it possible?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31054#M22724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the suggestion @goku123 ! I just posted it to the DevCenter as well. I will take all the help I can get with this one. I know the device must be capable of this, I'm just too inexperienced with it to know how to do it at this point.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 19:56:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-signature-needed-to-detect-quot-invalid-username-quot/m-p/31054#M22724</guid>
      <dc:creator>itmgr</dc:creator>
      <dc:date>2014-03-04T19:56:19Z</dc:date>
    </item>
  </channel>
</rss>

