this rule uses the FTP content filter to investigate command-line inputs of the FTP traffic. the aim is to detect FTP "admin" login attempts which could assist in identifying possible admin account abuse or compromise events.
BASIC
root@dco:~$ nano ftp-admin.sig
signature ftp-admin {
ip-proto == tcp
ftp /.*USER.*dmin.*/
event "FTP Admin Login Attempt!"
}
root@dco:~$ zeek -C -r ftp.pcap -s ftp-admin.sig
root@dco:~$ cat signatures.log | zeek-cut src_addr dst_addr event_msg sub_msg | sort -r| uniq
10.234.125.254 10.121.70.151 10.234.125.254: FTP Admin Login Attempt! USER administrator
10.234.125.254 10.121.70.151 10.234.125.254: FTP Admin Login Attempt! USER admin
* this rule rule will display multiple logging attempts with account names containing the "admin" phrase
- note that this is a case-based signature and will catch ALL admin login attempts
- IOT reduce false positives, global signatures MUST be used to detect the "known threats/anomalies"