Files
blue-team-tools/rules/linux/other/lnx_susp_failed_logons_single_source.yml
T
frack113 cd4121d966 Update Title (#3731)
Co-authored-by: Florian Roth <venom14@gmail.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2022-11-27 19:19:27 +01:00

26 lines
708 B
YAML

title: Failed Logins with Different Accounts from Single Source - Linux
id: fc947f8e-ea81-4b14-9a7b-13f888f94e18
status: test
description: Detects suspicious failed logins with different user accounts from a single source system
author: Florian Roth
date: 2017/02/16
modified: 2022/11/26
tags:
- attack.credential_access
- attack.t1110
logsource:
product: linux
service: auth
detection:
selection:
pam_message: authentication failure
pam_user: '*'
pam_rhost: '*'
timeframe: 24h
condition: selection | count(pam_user) by pam_rhost > 3
falsepositives:
- Terminal servers
- Jump servers
- Workstations with frequently changing users
level: medium