[Bro] How can I counter attacks to GMAIL accounts coming from known threats?
vlad at grigorescu.org
Sun Jul 12 02:09:07 PDT 2015
I don't understand what you're trying to do. The SSH scan is for
authentication brute-forcing. Is that what you're trying to detect for
GMail as well? Over what protocol(s)?
If your intel type is Intel::EMAIL, then it would expect an e-mail address,
and not an IP address.
I would recommend reviewing the documentation on the Intel framework:
On Sat, Jul 11, 2015 at 10:53 PM, Javier Richard Quinto Ancieta <
richardqa at gmail.com> wrote:
> Hi everyone,
> I am working with Bro and CIF Server through the Intel framework.
> All is ok when I test with Infrastructure/scan for SSH protocol. But I
> have problems when I want to filter attacks of scanning against Gmail
> I assumed that a filter for SMTP is:
> 188.8.131.52 Intel::Email CIF - need-to-know smtp
> http://www.openbl.org/lists/base_all_smtp-only.txt (public) -
> medium 85
> * 184.108.40.206 (known threat)
> I copy this filter in a file (e.g., smtp.intel) and I put at ./local.bro
> I reinstalled bro:
> broctl stop
> broctl check
> broctl install
> broctl start
> Bro is running with the new filter shown above.
> Finally, I tried to access to a GMAIL account from the IP 220.127.116.11
> (malicious IP) and I didnt receive some response (alert) from Bro IDS.
> Thus, I wonder How Can I filter malicious users that launches attacks to
> Gmail account?. How Do I have to work to counter this attack?
> Thank you,
> Bro mailing list
> bro at bro-ids.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Bro