Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

Brute Force GlobalProtect Portal via GP app

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Brute Force GlobalProtect Portal via GP app

L1 Bithead

I'm looking for a way to define a custom signature that can detect brute force attempts on the GlobalProtect portal that aren't based on the portal login page. I already have ID 40017 - VPN: Palo Alto Networks SSL VPN Authentication Brute Force Attempt - in place and working fine, however I realized that I'm seeing attacks now where someone has managed to replicate the auth sequence from the GP app itself. I've attempted using the following, but am not having any luck with it detecting my failed attempts:

 

alexg_8_3-1679925356788.png

 

alexg_8_2-1679925327162.png

Wireshark shows a 512 HTTP status code is returned when the auth fails:

alexg_8_4-1679925519836.png

I'm sure I'm missing something, so please let me know if you spot it or have dealt with this before.

 

3 REPLIES 3

L6 Presenter

If 512 is returned by the Palo Alto firewall maybe this is an issue why the signature does not work as the response is comming from the control plane.

 

You can try selecting transaction not session or as another workaround you can try placing the globalprotect gateway on the loopback interface https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKPCA0 / https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJHCA0 as maybe then firewall will match the signature when passing through the reply from the dataplane interface.

L2 Linker

Hi,

 

Just chiming in that we are seeing the same things.

While it is nice to know that we're not the only ones, it's not nice that it's happening at all.

 

Up to 3 attempts per minute.

Switching IPs after one or two attempts.
Version showing Browser
Usernames appear to come from a compiled list.
Clientless VPN and Portal page disabled.
SSO and MFA enabled.

Management won't allow more region blocking than just the usual suspects.


We certainly need a better solution.

L0 Member

Seeing the same.  Causing GP vpn users to be unable to connect if we leave the GP Portal up.

Tried setting "Detecting Brute Force Attack on GlobalProtect Portal Page":

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK

 

I set the hits frequency for 5 in 60 sec but it does not appear that the profile is triggered so no ips are blocked.

We restricted region to just US and it did not matter.

  • 7458 Views
  • 3 replies
  • 2 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!