03-03-2020 12:32 PM - edited 02-28-2021 08:15 AM
HTTP response status codes indicate whether a specific HTTP request has been successfully completed. Responses are grouped in five classes: informational responses, successful responses, redirects, client errors, and server errors. Monitoring HTTP status codes assist customers in locking down HTTP responses to prevent fingerprinting and helping create more effective App-ID signatures. These configured Threat Prevention custom signatures will log HTTP response status codes.
This skillet is intended for Palo Alto Networks SEs, PSEs, Partners, and Customers
Documentation: https://github.com/ceskillets/SecOps-HTTP-Response-Codes/blob/master/README.md
Github Location: https://github.com/ceskillets/SecOps-HTTP-Response-Codes.git
Github Branches: master
PAN-OS Supported: 7.x, 8.x, 9.x
Type of Skillet: panos/xml
Collections: Configuration
This HTTP Status code Skillet will create custom threat prevention signatures that will log all HTTP status codes in PAN-OS logs. It is designed to help customers determine misconfigurations and help with more focused Application ID (App-ID) signatures.
As you interact with a website, you make the request and the server responds. Status codes let us know whether the request was a success, a failure, or something in-between. Upon creating the custom threat prevention signatures, you can immediately start to utilize them for a few use cases:
Consider resetting these responses so an attacker does not get positive feedback that the application was impacted. Also, match the URL for the session and provide that to the app team to harden the code. If you have not fully adopted App-ID, then there is most likely a “catch-all” rule that exists that will be similar to this one.
In PAN-OS 8.1, rule count and first/last seen features were introduced. Correlating this data with the HTTP status codes, you can create more granular rules for your applications and not only see if those rules are being hit, but you can also filter on that rule in the traffic logs as well. As you keep building more App-ID centric rule in your security policy, see a decline in hit count for your “catch-all” rule and eventually be able to disable it with confidence. Disabling the catch-all rule prevents scanning tools such as Shodan and port scanners from footprinting your web application. This means that an attacker must actually know the proper URL for your hosted application to access it – a bar that any valid user will automatically pass.
Hi,
Additional Infos how easy you can add a Skillet to the existing fw config without external tools.
Add the bold lines to the skillet xml snippet. version depends on your PANOS verison, mine was 10.0.0
<?xml version="1.0"?>
<config urldb="paloaltonetworks" version="10.0.0">
<vulnerability>
Skillet Content
</vulnerability>
</config>
Go in the PAN webUI to Setup->Operations->Import named configuration snapshot and import the skillet xmlfile with the additional lines.
Change to cli on PAN an enter:
load config partial mode merge from-xpath vulnerability to-xpath /config/shared/threats/vulnerability from SkilletXmFile.xml
After that refresh the browser and commit the changes. Thats it
happy day
Fhu