@@ -71,7 +71,7 @@ private static void AssertLogFilesToParse(IPBanConfig cfg)
71
71
[
72
72
[
73
73
"/var/log/auth*.log\n /var/log/secure*\n /var/log/messages" ,
74
- @"(?<log>failed\s+password)\s+for\s+(?:invalid\s+user\s+)?(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh|(?<log>did\s+not\s+receive\s+identification\s+string)\s+from\s+(?<ipaddress>[^\s]+)|(?<log>connection\s+(?:closed|reset))\s+by\s+(?:(?:invalid\s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?:invalid\s+user\s+)?(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from\s+authenticating\s+user)\s+(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]" ,
74
+ @"(?<log>failed\s+password)\s+for\s+(?:invalid\s+user\s+)?(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh|(?<log>did\s+not\s+receive\s+identification\s+string)\s+from\s+(?<ipaddress>[^\s]+)|(?<log>connection\s+(?:closed|reset))\s+by\s+(?:(?:(?: invalid|authenticating) \s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?:invalid\s+user\s+)?(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from\s+authenticating\s+user)\s+(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]" ,
75
75
@"" ,
76
76
@"\s+Accepted\s+(?:password|publickey)\s+for\s+(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh" ,
77
77
@"" ,
@@ -200,7 +200,7 @@ private static void AssertEventViewer(IPBanConfig cfg)
200
200
AssertEventViewerGroup ( groups [ i ++ ] , "0x80000000000000" , minimumWindowsMajorVersion , 0 , false , "Application" , "PostgreSQL" , "//Provider[@Name='PostgreSQL']" , string . Empty , "//Data" , "host=(?<ipaddress>[^ ]+)" ) ;
201
201
AssertEventViewerGroup ( groups [ i ++ ] , "0x80000000000000" , minimumWindowsMajorVersion , 0 , false , "System" , "MSExchange" , "//Provider[@Name='MSExchangeTransport']" , string . Empty , "//Data" , "(?<log>LogonDenied)" , "//Data" , "(?<ipaddress_exact>.+)" ) ;
202
202
AssertEventViewerGroup ( groups [ i ++ ] , "0x80000000000000" , minimumWindowsMajorVersion , 0 , false , "Application" , "phpMyAdmin" , "//Data" , "phpMyAdmin" , "//Data" , @"(?<log>user\sdenied):\s+(?<username>[^\s]+)\s+\(mysql-denied\)\s+from\s+(?<ipaddress>.+)" ) ;
203
- AssertEventViewerGroup ( groups [ i ++ ] , "0x4000000000000000" , minimumWindowsMajorVersion , 0 , false , "OpenSSH/Operational" , "SSH" , "//Data[@Name='payload']" , @"(?<log>failed\s+password)\s+for\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh|(?<log>did\s+not\s+receive\s+identification\s+string)\s+from\s+(?<ipaddress>[^\s]+)|(?<log>connection\s+closed) \s+by\s+(( invalid\s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from\s+authenticating\s+user)\s+(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]" ) ;
203
+ AssertEventViewerGroup ( groups [ i ++ ] , "0x4000000000000000" , minimumWindowsMajorVersion , 0 , false , "OpenSSH/Operational" , "SSH" , "//Data[@Name='payload']" , @"(?<log>failed\s+password)\s+for\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh|(?<log>did\s+not\s+receive\s+identification\s+string)\s+from\s+(?<ipaddress>[^\s]+)|(?<log>connection\s+(?: closed|reset)) \s+by\s+(?:(?:(?: invalid|authenticating) \s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|(?<log>disconnected\s+from\s+authenticating\s+user)\s+(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]" ) ;
204
204
AssertEventViewerGroup ( groups [ i ++ ] , "0x80000000000000" , minimumWindowsMajorVersion , 0 , false , "Application" , "SSH" , "//EventID" , "^0$" , "//Data" , "^sshd:\\ spid\\ s[0-9]+:\\ sinvalid\\ suser\\ s(?<username>[^\\ s]+)\\ sfrom\\ s(?<ipaddress>[^\\ s]+)\\ sport\\ s[0-9]+" ) ;
205
205
AssertEventViewerGroup ( groups [ i ++ ] , "0x4000000000000000" , minimumWindowsMajorVersion , 0 , false , "Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational" , "RDP" , "//Opcode" , "^(?<log>14)$" , "//Data[@Name='ClientIP' or @Name='IPString']" , "(?<ipaddress>.+)" ) ;
206
206
AssertEventViewerGroup ( groups [ i ++ ] , "0x80000000000000" , minimumWindowsMajorVersion , 0 , false , "Application" , "VNC" , "//EventID" , "^258$" , "//Data" , @"(?<log>Authentication\sfailed)\sfrom\s(?<ipaddress>.+)" ) ;
0 commit comments