HTTP Brute Force Attempt

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

HTTP Brute Force Attempt

L0 Member

I was contacted by a major government entity about an HTTP Brute Force attack/attempt coming from my institution.  Their IDS triggered on a researcher in my organization attempting to login to one of their training websites.  The user forgot their password.  I only found out due to this user being only one in the PAN going to this website, however, what I'm wondering is why the PAN wouldn't have labeled it first?  Has anyone come across something like this before?

1 REPLY 1

L4 Transporter

This is a bit older, but it may help.

"If a session has the same source and destination and triggers a single

login/authentication event 100 times in 60 seconds, we will identify

it as a brute force attack."

  • 1753 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!