Investigating Alerts - phbits/WebsiteFailedLogins GitHub Wiki
The following subpages provide information on how to investigate alerts.
Note: IIS logs in UTC so the Logparser queries will also use UTC.
Additional Information
After reviewing the sub-sections above, the following may be of help.
cs(User-Agent)
Some automated scanners will use a unique and descriptive User-Agent string that appears in the IIS Log Field cs(User-Agent)
. While easily spoofed it can be a quick indicator of unnecessary traffic since legitimate requests will rarely make any changes to this setting.
cs-username
Identify if a single user is being targeted or if multiple users are being targeted. This will indicate password spraying (single password to many users) vs. brute forcing (many passwords to a single account). IIS log field cs-username
is used for logging the client provided username.
Reverse DNS
Legit vulnerability scanners may trigger these settings. A reverse DNS lookup will often provide this identification by returning something like vulnscan.security.domain.com.
Basic/Windows Authentication
If using either of these authentication methods, take a closer look at the IIS log fields sc-substatus
and sc-win32-status
as they'll provide more context as to why an HTTP 401 was returned. Note that initial requests will not contain credentials resulting in NULL
being logged by IIS in the cs-username
field and is a function of how Basic/Windows authentication is initiated.
sc-status & sc-substatus: The HTTP status code in IIS 7.0 and later versions
sc-win32-status: Microsoft System Error Codes
Windows Event Log
Depending on how the website authenticates users and if logging at a sufficient verbosity, failed logins will be logged to the Windows Event Log on the target web server (IIS log field s-computername
) for that request.
Timing
Review the timing of requests to determine if they appear to be automated. An actual person shouldn't exceed one failed login every 2-5 seconds.
Whois
Check whois to get more information about the IP address. Is it part of a security research group? Perhaps a temporary virtual machine on a cloud hosting provider? etc.
IP Reputation
Check IP reputation services to identify whether other attacks have been reported from this IP address. SANS offers a great service. Just place the IP address in the search box at: https://isc.sans.edu/ipinfo.html
IP Geolocation
While not 100% accurate, getting reliable geolocation data can help build context around the client IP address. MAXMIND has been incredibly accurate.
Cross-Check Logs
Consider performing a cross-check of other internal logs for indications of abuse from the IP address. A good place to start would be perimeter flow data and/or firewall logs.