
Summary
The 'Hack Tool User Agent' rule is designed to detect suspicious user agent strings that are commonly employed by various hacking tools when logged in proxy logs. It identifies a wide array of known malicious user agents, including those used by password cracking tools, vulnerability scanners, and malware-related scripts. This rule aggregates different user agent patterns that have been identified in security incidents and group them using a combination of regex and pattern matching logic. The detection focuses on HTTP request logs and captures relevant data fields, such as Client IP and User Agent, to provide contextual information when a suspicious entry is detected. Utilizing this rule can aid security analysts in proactively identifying potential exploitation attempts and ensuring prompt incident response.
Categories
- Web
- Network
- Infrastructure
Data Sources
- Logon Session
- Network Traffic
- Application Log
- Process
- Firewall
Created: 2017-07-08