- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-21-2024 12:30 AM
Hi, can i get common username patterns that are getting matched with the PA signature "Compromised or commonly used username found in HTTP Basic Authentication" ??
Any links where i can get the usernames that are mapped with this signature which are designated as compromised or commonly used ??
03-22-2024 01:30 PM
Hello,
What are you looking to obtain this information for?
I would assume Palo Alto is not going to release exactly what triggers there vulnerability signatures. If they were to provide this information you would probably have to open a TAC case to get an official response, but again my assumption is they wouldnt give you this.
Here is the information listed in the threat vault:
https://threatvault.paloaltonetworks.com/?query=Compromised or commonly used username found in HTTP Basic Authentication&type=
03-26-2024 12:00 AM
Hello,
There was a particular traffic between 2 servers which got identified with this IPS signature but when checked with the respective server owner there was no generic/common usernames found in the server.
So would like to know what kind of key parameters(usernames) considered for this IPS signature.
Thanks & Regards,
03-26-2024 01:03 AM
As the signature name indicates, the common username was found in HTTP Basic Authentication, in other words, it was found in the traffic that the firewall saw. It doesn't mean that the common username exists on the server.
If you collect the threat pcap, you should be able to see what username is used in the traffic.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!