Difference between revisions of "HIDS 5710"
From Atomicorp Wiki
(Created page with "{{Infobox |header1 = Rule 5710 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Attempt to login using a non-existent user }} = Description = This rule det...") |
Latest revision as of 15:47, 12 August 2020
Rule 5710 | |
---|---|
Status | Active |
Alert Message | Attempt to login using a non-existent user |
Contents |
[edit] Description
This rule detects attempts to log into accounts that do not exist on the system. This may indicate that an attacker is attempting to find default accounts to log into, or is carrying out a brute force attack.
[edit] examples
Rule: 5710 (level 5) -> 'Attempt to login using a non-existent user' Src IP: 123.30.157.239 Src Location: VN / An Giang Aug 11 20:46:20 www sshd[13235]: Invalid user aconnelly from 123.30.157.239
[edit] Troubleshooting
[edit] False Positives
There are no known false positives with this rule. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.
Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.
[edit] Notes
None.