Skip to content

Instantly share code, notes, and snippets.

<!-- WordPress wp-login.php brute force -->
<rule id="31509" level="3">
<if_sid>31108</if_sid>
<url>wp-login.php</url>
<regex>] "POST \S+wp-login.php</regex>
<description>WordPress login attempt.</description>
</rule>
<!-- If we see frequent wp-login POST's, it is likely a bot. -->
<rule id="31510" level="8" frequency="6" timeframe="30">
import zmq
context = zmq.Context()
s = context.socket(zmq.SUB)
s.connect("tcp://localhost:11999")
s.setsockopt(zmq.SUBSCRIBE, "")
import pika
connection = pika.BlockingConnection()
channel = connection.channel()
import zmq
import smptlib
import json
context = zmq.Context()
socket = context.socket(zmq.SUB)
socket.connect("tcp://127.0.0.1:5000")
socket.setsockopt(zmq.SUBSCRIBE, "ossec.alerts")
ssmtp = smtplib.SMTP()
ssmtp.connect(host="smpt.host.here")

Table of Contents

['_Resource__load', '_Resource__set_attrs', 'class', 'delattr', 'dict', 'doc', 'format', 'getattribute', 'hash', 'init',

Table of Contents

Table of Contents

Table of Contents

Table of Contents

bug fix of eventchannel timestamp

Table of Contents