Brute Force Signature and Related Trigger Conditions

Brute Force Signature and Related Trigger Conditions

393672
Created On 09/26/18 13:44 PM - Last Modified 03/14/24 11:07 AM


Resolution


This document lists the trigger condition for each brute force signature.

 

Details

Trigger #Application NameNameDescription 
40001FTPLogin Brute Force Attempt

If a session has the same source and destination but triggers our child signature, 40000, 10 times in 60 seconds, we call it a brute force attack.

The child signature, 40000, is looking for a "530" ftp response message after user sent "PASS" command.

 
40003DNSSpoofing Cache Record Attempt

If a session has the same source and destination but triggers our child signature, 40002, 100 times in 60 seconds, we call it is a brute force attack.

The child signature, 40002, is looking for dns response header, if all count(Question/Answer/Authority/Additional) is 1.

 
40004SMBUser Password Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31696, 30 times in 60 seconds, we call it is a brute force attack.

The child signature, 31696, is looking for smb SetupX with response error code 0x50001, and error code 0xc000006d for any smb command.

 
40005LDAPUser Login Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31706, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 31706, is looking for LDAP bindResponse(27), if resultCode is 49.

 
40006HTTPUser Authentication Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31708, 100 times in 60 seconds, we call it is a brute force attack.

The child signature, 31708, is looking for http response code 401 with "WWW-Authenticate:" in the response header.

 
40007MAILUser Login Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31709, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 31709, works on 3 apps, smtp, pop3 and imap.

The trigger condition is found in response code 535 in smtp, "No/bad logon/login failure" pattern in imap and "-ERR" on pop3 PASS command.

 
40008MY SQLAuthentication Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31719, 25 times in 60 seconds, we call it is a brute force attack.

The child signature, 31719, is looking for error code 1045 on mysql clientauth stage.

 
40009TELNETAuthentication Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31732, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 31732, is looking for "login incorrect" pattern in reponse packet.

 
40010Microsoft SQL ServerUser Authentication Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 31753, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 31753, is looking for "Login failed for user" from response packet.

 
40011Postgres DatabaseUser Authentication Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 31754, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 31754, is looking for  "password authentication failed for user " from response packet.

 
40012Oracle DatabaseUser Authentication Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 31761, 7 times in 60 seconds, we call it is a brute force attack.

The child signature, 31761, is looking for  "password authentication  failed for user " from response packet.

 
40013Sybase DatabaseUser Authentication Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 31763, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 31763, is looking for "Login failed"  from response packet.

 
40014DB2 DatabaseUser Authentication Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 31764, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 31764, is looking for 0x1219 "Code point" with severity code 8 and security check code 0xf.

 
40015SSHUser Authentication Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 31914, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 31914 is alert on every connection on ssh server.

 
40016SIP INVITEMethod Request Flood Attempt

If a session has the same source and destination but triggers our child signature, 31993, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 31993 is looking for "INVITE" method on SIP session.

 
40017GlobalProtectPalo Alto Networks GlobalProtect Authentication Brute-force Attempt

If a session has the same source and destination but triggers our child signature, 32256, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 32256, is looking for either "POST /ssl-vpn/login.esp" or "POST /global-protect/login.esp" in the http URI response header.  This indicates a login attempt.

 
40018HTTPApache HTTP Server Denial of Service Attempt

If a session has the same source and destination but triggers our child signature, 32452, 40 times in 60 seconds, we call it is a brute force attack.

The child signature, 32452 is looking for HTTP request, which has content-length but without "\r\n\r\n" in the request.

 
40019HTTPIIS Denial of Service Attempt

If a session has the same source and destination but triggers our child signature, 32513, 12 times in 30 seconds, we call it is a brute force attack.

The child signature, 32513, is looking for "%3f" on http uri path with ".aspx"

 
40020Digium Asterisk IAX2Call Number Exhaustion Attempt

If a session has the same source and destination but triggers our child signature, 32785, 10 times in 30seconds, we call it is a brute force attack.

The child signature, 32785, is looking for call number field in Asterisk message.

 
40021MS-RDPMS Remote Desktop Connect Attempt

If a session has the same source and same destination but triggers our child signature, 33020, 8 times in 100 seconds, we call it is a brute force attack.

The child signature, 33020, is looking for CONNECT action in ms-rdp request.

 
40022HTTPMicrosoft ASP.Net Information Leak Brute-force Attempt

If a session has the same source and same destination but triggers our child signature, 33435, 40 times in 30 seconds, we call it is a brute force attack.

The child signature, 33435, is looking for response code 500 and response header contain "\nX-Powered-By: ASP\.NET"

 
40023SIPSIP Register Message Brute Force Attack

If a session has the same source and same destination but triggers our child signature, 33592, 60 times in 60 seconds, we call it is a brute force attack.

The child signature, 33592, is looking for "REGISTER" SIP method.

 
40025AFP requests

Novell Netware AFP Remote Denial of Service Vulnerability

Novell Netware is prone to a denial of service vulnerability while parsing certain crafted AFP requests.
This signature detects this DoS attack. This signature triggers when the child signature,54823, triggers 50 times within 3 seconds.
 
40028SIPSIP Bye Message Brute-force Attack

If a session has the same source and same destination but triggers our child signature, 34520, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 34520, is looking for SIP BYE method.

 
40030HTTPHTTP NTLM Authentication Brute-force Attack

If a session has the same source and same destination but triggers our child signature, 34548, 20 times in 60 seconds, we call it is a brute force attack.

The child signature, 34548, is looking for HTTP response 407 and NTLM proxy authorizationi condition.

 
40031HTTPHTTP Unauthorized Brute-force Attack

If a session has the same source and same destination but triggers our child signature, 34556, 100 times in 60 seconds, we call it is a brute force attack.

The child signature, 34556, is looking for HTTP 401 response.

 
40032HTTPHOIC Tool Brute Force Attack

If a session has same source and same destination but triggers our child signature, 34767, 100 times in 60 seconds, we call it is a brute force attack.

The child signature, 34767, is looking for HTTP request from HOIC tool.

 
40033DNSANY Queries Brute-force DOS Attack

If a session has same source and same destination but triggers our child signature, 34842, 250 times in 30 seconds, we call it is a brute force attack.

The child signature, 34842, is looking for DNS request.

 
40034SMBMicrosoft Windows SMB NTLM Authentication Lack of Entropy Vulnerability

If a session has same source and same destination but triggers our child signature, 35364, 20 times in 10 seconds, we call it is a brute force attack.

The child signature, 35364, is looking for an SMB Negotiate (0x72) request.  Multiple requests in a short time could be an attack for CVE-2010-0231.

 
40036MYSQLMySQL COM_CHANGE_USER Brute-force Attempt

This event indicates that someone is doing a brute force attack and tries to authenticate as another user via COM_CHANGE_USER command to the MySQL server.
If a session has the same source and same destination but triggers our child signature, 36157,7 times in 60 seconds, we call it is a brute force attempt.

 
40037SCADASCADA Password Crack Brute Force Attack

If a session has same source and same destination but triggers our child signature, 31670, 10 times in 60 seconds, we call it is a brute force attack.

The child signature, 31670, is looking for ICCP COTP connection requests from unauthorized clients.

 
40038NTPNTP Amplification Denial-Of-Service AttackIf a session has same source and same destination but triggers our child signature, 36343, 255 times in 10 seconds, we call it is a brute force attack.

The child signature, 36343, is looking for MON_GETLIST or MON_GETLIST_1 ( 0x2a or 0x14).  This is related to CVE-2013-5211.
 
40039TLSOpenSSL TLS Heartbeat Brute Force - Heartbleed

If a session has the same source and same destination but triggers our child signature, 36417, 120 times in 30 seconds, we call it is a brute force attack.

The child signature, 36417, is looking for the heartbeat request in OpenSSL TLS.

 
40042HTTPSlowhttptest Denial-of-Service Attempt

This event indicates an application layer denial of service (DoS) attack using Slowhttptest DoS Attack Simulator. This signature triggers when the child signature, Slowhttptest Application Layer DoS Attack Simulator Detection (ID 37560) triggers 7 times within 30 seconds. 

The child signature, 37560, indicator of slowhttptest attack simulator traffic in HTTP request.

 
40043HTTPWebDav Option Request Abnormal

This signatures indicates many WebDav option request have been received in a short time which indicates some abnormal activity. 30 times within 60 secs.

The child signature, 37097, is looking for a WebDav option request.

 
40044HTTPWordPress Login Brute Force Attempt

This event indicates that someone is using a brute force attack to gain access to WordPress wp-login.php. The brute force signature looks for(by default) 10 or more triggers of child signature TID: 37480 in 60 seconds. The child signature is looking for access attempts to wp-login.php. 

 
40045HTTPWordPress Login Brute Force Attempt

OpenSSL is prone to a denial-of-service vulnerability while parsing specific crafted requests. The child signature is 37784 in this case and parent signature will watch 10 hit in 60 seconds.

 
40047SCTPSCTP INIT Flood Attack

This detects flooding of SCTP INIT messages towards target node. This signature triggers when the child signature 38522 triggers 255 times within 2 seconds. The child signature is looking for an INIT (initiation) chunk in the SCTP packet.

 
40048SCTPS1AP Paging Flood 

This signature detects the S1AP message flooding. This signature triggers when the child signature 38536 triggers 255 times within 2 seconds. The child signature is looking for S1AP procedure code for paging in the SCTP S1AP request.

 
40049SCTPS1AP UE Attach Request Flood

This signature detects the S1AP UE attach message flooding. This signature triggers when the child signature 38718 triggers 255 times within 2 seconds. The child signature is looking for an attach request in the SCTP S1AP request.

 
40059SSL
OpenSSL DTLS Handshake Parsing Denial-of-Service Vulnerability

This alert indicates an HTTP 302 temporary redirection. Multiple redirections for authentication responses indicates a possible brute-force attack on the target server.

If a session has the same source and same destination, but triggers our child signature,39290,100 times in 30 seconds, we call it is a brute force attack.

 
40071SSHOpenSSH Denial of Service Vulnerability

OpenSSH is prone to a denial of service vulnerability while parsing certain crafted SSH requests.  The vulnerability is due to the lack of proper checks on the key-exchange process in the SSH requests, leading to an exploitable denial of service.  An attacker could exploit the vulnerability by sending a crafted SSH request.  A successful attack could lead to excessive memory consumption causing a denial-of-service condition.

The child signature "OpenSSH Key Exchange Message Code 20 Detection" (33095) indicates a key-exchange message code 20 detected.  A multiple detections means an attack is try to brute-force to cause a denial-of-service condition.

 
40078SMB

Windows SMB SMBLoris Denial-of-Service Vulnerability

If a session has same source and same destination and triggers our child signature, 37713, 100 times in 10 seconds, we call it is a brute force attack.The child signature is checking crafted SMB request. 

 
40087DNSDNS Tunnel Data Exfiltration Traffic Brute Force

If a session has the same source and same destination but triggers our child signature, 34061, 5 times in 2 seconds, we call it is a brute force attack.

The child signature, 34061, is looking for Abnormal Domain in DNS Request Question Section.

 
40093HTTPTorshammer HTTP DoS Attack Brute Force Detection

If a session has the same source and same destination but triggers our child signature, 54546, 10 times in 1 seconds, we call it is a brute force attack.

The child signature, 54546, is looking for HTTP requests with only one byte payload in the packet.

 
40094HTTPSlowloris HTTP Flooding Denial-of-Service Brute Force Attempt Detection

If a session has the same source and same destination but triggers our child signature, 54547, 10 times in 5 seconds, we call it is a brute force attack.

The child signature, 54547, is looking for HTTP GET Request without headers.

 
40097Cisco Adaptive Security Appliance SoftwareCisco Adaptive Security Appliance Software Denial-of-Service Brute Force Vulnerability

If a session has the same source and same destination but triggers our child signature, 37299, 50 times in 2 seconds, we call it is a brute force attack.

The child signature, 37299, is looking for invalid sent-by address 0.0.0.0 in SIP requests.

 
40098WordPressWordPress Load Script Denial-of-Service Brute Force Vulnerability

If a session has the same destination but triggers our child signature, 39421, 20 times in 2 seconds, we call it is a brute force attack.

The child signature, 39421, is looking for Wordpress Load Script Action.

 
40101CirCarLife SCADACirCarLife SCADA Brute Force Attempt Detection

If a session has the same source and same destination but triggers our child signature, 55541, 30 times in 1 seconds, we call it is a brute force attack.

The child signature, 55541, is looking for CirCarLife SCADA login attempt.

 
40104SSHSSH Failed Brute-force Authentication AttemptIf a session has the same source and same destination but triggers our child signature, 55873, 20 times in 60 seconds, we call it is a brute force attack.
The child signature, 55873, is looking for SSH2 failed login attempt.
 
40106YourlsYourls Improper Authentication Brute Force Vulnerability

If a session has the same source and same destination but triggers our child signature, 56375, 25 times in 10 seconds, we call it is a brute force attack.

The child signature, 56375, is looking for Yourls improper authentication attempt.

 
40109Compal CH7465LGCompal CH7465LG Improper Input Validation Brute-Force Attempt Detection

If a session has the same source and same destination but triggers our child signature, 56705, 10 times in 30 seconds, we call it is a brute force attack.

The child signature, 56705, is looking for an improper input in HTTP POST request.

 
40111Craft CMSCraft CMS Improper Authentication Brute-Force Attempt Detection

If a session has the same source and same destination but triggers our child signature, 56933, 10 times in 30 seconds, we call it is a brute force attack.

The child signature, 56933, is looking for Craft CMS admin password reset attempt in HTTP requests.

 
40112Prima Systems FlexAirPrima Systems FlexAir Backup Database Download Brute-Force Attempt Detection

If a session has the same source and same destination but triggers our child signature, 57028, 10 times in 10 seconds, we call it is a brute force attack.

The child signature, 57028, is looking for Prima Systems FlexAir backup database download attempt in HTTP requests.

 
40119SquidSquid Integer Overflow Vulnerability

If a session has the same source and destination and triggers our child signature, 58065, 20 times in 10 seconds, we call it is a brute force attack.

The child signature, 58065 is looking for Proxy-Authorization: Digest messages containing a nonce, which may be crafted to exploit CVE-2019-18679.

 
40136Ubiquiti EdgeMAXDenial-of-Service Vulnerability

If a session has the same source and destination and triggers our child signature, 90884, 60 times in 10 seconds, we call it is a DOS attack. This is a part of Brute Force signatures as it's based on number of hits per a given time.

The child signature, 90884 detects HTTP request with cookie containing beaker.session.id.

 

 

In the event that the Threat ID you are looking for is not in this list, you can always view the value inside of the Vulnerability protection profile by clicking inside of the WebGUI on Objects > Security Profiles > Vulnerability Protection. Inside there you need to click on a profile name. In this example, we will click on default.

image.png
(Vulnerability Protection screen)


Once inside there, click on Exceptions tab, then select "Show all signatures" in the lower left corner of the window. Then search on the Threat ID that you would like to see details about. 
Once you see the Threat ID you were looking for, then click on the small Pencil (edit) to the left of the Threat Name.

Note: If the threat does not show up, please ensure that you have updated your Dynamic Updates inside of Device > Dynamic Updates
image.png


(Vulnerability profile - Exceptions screen)


Once this screen is up, you will see the attributes and the time period that this Vulnerability will be triggered with.

image.png
(Threat Detail screen showing the trigger details.)

 

SEE ALSO

For more information on any of these threats/vulnerabilities, please visit our Threat Vault:

https://threatvault.paloaltonetworks.com/


THREAT LOG GENERATION CRITERIA FOR BRUTE FORCE PARENT/CHILD SIGNATURES
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boRMCAY 
 

owner: akawimandan

 

 



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language