<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA NGF SMB bruteforce behavior in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ngf-smb-bruteforce-behavior/m-p/356762#M87684</link>
    <description>&lt;P&gt;the 31696 simply counts login attempts, it doesn't doublecheck if the same password is being used or a different one each time&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2020 14:21:53 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-10-16T14:21:53Z</dc:date>
    <item>
      <title>PA NGF SMB bruteforce behavior</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ngf-smb-bruteforce-behavior/m-p/356056#M87606</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im wondering what is the behavior of SMB bruteforce vulnerability alert from PA FW.&amp;nbsp;&lt;SPAN&gt;Vulnerability id (40004) SMB brute force seems to be triggered by a child signature&amp;nbsp;31696(SMB login attempt). Question is the child triggered every time there was a failed login? Regardless if the failed attempt was caused by entering the same password over and over again? because brute force usually is done by trying random password each time. Thanks for your advice&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 10:14:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ngf-smb-bruteforce-behavior/m-p/356056#M87606</guid>
      <dc:creator>herbert.lopez</dc:creator>
      <dc:date>2020-10-13T10:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: PA NGF SMB bruteforce behavior</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ngf-smb-bruteforce-behavior/m-p/356762#M87684</link>
      <description>&lt;P&gt;the 31696 simply counts login attempts, it doesn't doublecheck if the same password is being used or a different one each time&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 14:21:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ngf-smb-bruteforce-behavior/m-p/356762#M87684</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-10-16T14:21:53Z</dc:date>
    </item>
  </channel>
</rss>

