You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml
+18-14Lines changed: 18 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -11,21 +11,17 @@ This rule detects unusual spikes in web server requests with uncommon or suspici
11
11
indicate reconnaissance attempts by attackers trying to identify vulnerabilities in web applications or servers. These
12
12
user-agents are often associated with automated tools used for scanning, vulnerability assessment, or brute-force attacks.
13
13
"""
14
-
from = "now-61m"
15
-
interval = "1h"
14
+
from = "now-9m"
15
+
interval = "10m"
16
16
language = "esql"
17
17
license = "Elastic License v2"
18
18
name = "Web Server Suspicious User Agent Request Spike"
19
19
risk_score = 21
20
20
rule_id = "a1b7ffa4-bf80-4bf1-86ad-c3f4dc718b35"
21
21
severity = "low"
22
22
tags = [
23
-
"Domain Scope: Single",
24
23
"Domain: Web",
25
24
"Domain: Network",
26
-
"OS: Linux",
27
-
"OS: macOS",
28
-
"OS: Windows",
29
25
"Use Case: Threat Detection",
30
26
"Tactic: Reconnaissance",
31
27
"Tactic: Credential Access",
@@ -46,7 +42,6 @@ from
46
42
logs-apache_tomcat.access-*,
47
43
logs-iis.access-*
48
44
| where
49
-
@timestamp > now() - 1 hours and
50
45
(url.original is not null or url.full is not null) and
51
46
(
52
47
user_agent.original like "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" or // Nikto
@@ -62,11 +57,20 @@ from
62
57
user_agent.original like "DirBuster*" or // Dirbuster
63
58
user_agent.original like "gobuster/*" or // Gobuster
64
59
user_agent.original like "*nmap*" or // Nmap Scripting Engine
65
-
user_agent.original like "*hydra*" // Hydra Brute Forcer
60
+
user_agent.original like "*hydra*" or // Hydra Brute Forcer
61
+
user_agent.original like "*w3af*" or // w3af Web Application Attack and Audit Framework
62
+
user_agent.original like "*Arachni*" or // Arachni Web Application Security Scanner
63
+
user_agent.original like "*Skipfish*" or // Skipfish Web Application Security Scanner
64
+
user_agent.original like "*OpenVAS*" or // OpenVAS Vulnerability Scanner
65
+
user_agent.original like "*Acunetix*" or // Acunetix Vulnerability Scanner
66
+
user_agent.original like "*Nessus*" or // Nessus Vulnerability Scanner
67
+
user_agent.original like "*dirsearch*" or // dirsearch
68
+
user_agent.original like "*ZAP*" or // OWASP ZAP
69
+
user_agent.original like "*Burp*" // Burp Suite
66
70
)
67
71
68
-
| eval Esql_url_text = case(url.original is not null, url.original, url.full)
69
-
| eval Esql_url_lower = to_lower(Esql_url_text)
72
+
| eval Esql.url_text = case(url.original is not null, url.original, url.full)
0 commit comments