<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB : SMB: User Password Brute-force Attempt in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181260#M55999</link>
    <description>&lt;P&gt;How can you setup a packet capture on just that vulnerability threat?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Oct 2017 11:22:34 GMT</pubDate>
    <dc:creator>s.williams1</dc:creator>
    <dc:date>2017-10-11T11:22:34Z</dc:date>
    <item>
      <title>SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96731#M44020</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my customer had a problem with this threat. They have a internal app which was failing when palo alto updates changed the action to reset-both. Customer told me that this problem started last 15/06 but i went to the PA updates mails and i didnt see anything about changing the action for this threat (SMB: User Password Brute-force Attempt ID&amp;nbsp;40004)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In default action we can see alert but PA is doing "reset both"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whats happening??&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 10:14:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96731#M44020</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2016-07-12T10:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96791#M44021</link>
      <description>&lt;P&gt;did you make sure the rule is set to action 'default'? If it is set to anything else, the default action of the threat will be ignored.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-07-12_15-19-30.jpg"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/B81F31A7B44084F326ABA63EFCA50C9D/responsive_peak/images/image_not_found.png" alt="2016-07-12_15-19-30.jpg" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 13:21:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96791#M44021</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-07-12T13:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96803#M44025</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My appologies, I didn't look at the threat-id very close and mistook it for a error that we were having earlier.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Make sure that your Vulnerability Protection Profile isn't changed from the default action.&lt;/P&gt;&lt;P&gt;2) In the meantime you might want to setup a rule that allows the application connection from Trust users to that specific IP address with everything except a Vulnerability Protection Profile to mediate the issue for the time being. If I would have to guess though your Protection Profile is set to something other then default.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It might be a good idea to have your programmers look at the application though. It sounds like if someone enters in the wrong password then the application is rapidly trying to login without a pre-defined wait period between authentification tries. Unless this is happening everytime a user logs in but I imagine it would be a more pressing issue if they physically could not access the application.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 13:48:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/96803#M44025</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-12T13:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/97599#M44057</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is our config:&lt;/P&gt;&lt;P&gt;I dont see what it can be wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cap1.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4826iB6190E07BE660E5B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Cap1.jpg" alt="Cap1.jpg" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cap2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4827iDC26FBDED392C11D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Cap2.jpg" alt="Cap2.jpg" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 07:28:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/97599#M44057</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2016-07-14T07:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98005#M44084</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the action of your rule "deny high" is set to 'block' instead of 'default', this will override all default actions and will block every high and critical (even if the default action is alert)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;additionally, the 'enable' checkbox for threat exceptions is checked for threat 40004 which means it would need to override the policy action with it's own action. in this case allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you make sure that policy has been properly committed and verify the logs the customer is seeing are being interpreted correctly ?&lt;/P&gt;
&lt;P&gt;because threat 40004 is set to 'allow' it should be totally ignored and &lt;EM&gt;not&lt;/EM&gt; logged. if you do see this threat in the logs, they may be hitting a different vulnerability profile (the default one maybe?) or the policy may not have been committed properly (try commit force)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 09:36:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98005#M44084</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-07-15T09:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98271#M44114</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The profile they use is IPS_ALERT_ALL. You can see the config above. They changed the action alert fot the threat "SMS Brute force" to allow, because firewall was dropping the packets in a internal app.We dont know why suddenly FW started to detect this threat in a normal traffic. What "SMB BRUTE force" detects), how many tries per time in order to detect it as threat???&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 06:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98271#M44114</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2016-07-18T06:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98277#M44117</link>
      <description>&lt;P&gt;I'm not sure what the exact parameters are but this signature should be unchanged since 2010 (check out&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;threatvault&lt;/A&gt;&amp;nbsp;)&lt;/P&gt;
&lt;P&gt;Maybe some software was updated on the customer's network that caused a certain event to increase in frequency, triggering the signature? you could try setting up a packetcapture to see what is going on exactly&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 07:29:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/98277#M44117</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-07-18T07:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181260#M55999</link>
      <description>&lt;P&gt;How can you setup a packet capture on just that vulnerability threat?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2017 11:22:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181260#M55999</guid>
      <dc:creator>s.williams1</dc:creator>
      <dc:date>2017-10-11T11:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181281#M56010</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71957"&gt;@s.williams1&lt;/a&gt;&amp;nbsp;you can't&lt;/P&gt;
&lt;P&gt;packetcapture is enabled|disabled on the profile level&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you create a security policy exclusively for application 'smb' and give it it's own security profile with packetcapture enabled, you'd only capture packets related to smb&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2017 12:51:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181281#M56010</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-11T12:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181319#M56025</link>
      <description>&lt;P&gt;Are you sure? If I go the Exception area and search for code 40004 I can select packet capture on that one only.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2017 15:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181319#M56025</guid>
      <dc:creator>s.williams1</dc:creator>
      <dc:date>2017-10-11T15:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: SMB : SMB: User Password Brute-force Attempt</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181463#M56047</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71957"&gt;@s.williams1&lt;/a&gt;&amp;nbsp;you're right! i forgot about the exceptions&lt;/P&gt;
&lt;P&gt;enable an exception, enable the pcap, done ! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2017 09:05:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smb-smb-user-password-brute-force-attempt/m-p/181463#M56047</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-12T09:05:26Z</dc:date>
    </item>
  </channel>
</rss>

