Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
dzimofuk
New Contributor

HTTPS Bruteforce signature - rate limit

Hi,

I am trying to create a custom signature for HTTPS Bruteforce detection (SSL inspection enabled) and I have the following syntax: F-SBID (--name Website.Brute.Force.CustomBody; --protocol TCP; --flow from_server; --pattern "failed because"; --context body; --rate 5,45,limit; --track SRC_IP;)

it is based on server "failed" answers, but even if the rate is 5,45 sometimes alert is triggered even earlier (3,4 attempts) Does anyone know how to mitigate that, or what to change to have more accurate detection.

Thx in advance!

BR Petr Bucek

5 REPLIES 5
ede_pfau
SuperUser
SuperUser

I think you should use

--flow from_server,reversed;
See post #102544 for example.

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
dzimofuk

Hi,

 

thx for your answer, but even if i added "reversed" the detection is not working properly.

F-SBID(--name Website.Brute.Force; --protocol TCP; --flow from_server,reversed; --pattern "failed because"; --context body; --rate 6,60,limit; --track SRC_IP;) The behavior is the same like before, (example: even 4 attempts generate 3 alarms etc.)

dzimofuk

noone knows?

ede_pfau

I'd open a ticket and ask FTNT Service for help. They know for sure.

If so, would be nice to see it here.

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
dzimofuk

Yop, you are right :) I have done it ...thx

 

BR

Petr

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors