instruction
stringclasses 1
value | input
stringlengths 2.77k
14.4k
| output
stringclasses 2
values |
---|---|---|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645119", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网郴州供电公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645119, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.195.149", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64964, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvuMJAADwG+Z+sEcOVdh+l4P3EAbt93tW61kckZlAYBAElzQAAFgMBAMIBAAC+AwN2SZK27IVfs2AOsl9Rutz4zz+Uz0vWSXTLTMlBOIWqpwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvuMJAADwG+Z+sEcOVdh+l4P3EAbt93tW61kckZlAYBAElzQAAFgMBAMIBAAC+AwN2SZK27IVfs2AOsl9Rutz4zz+Uz0vWSXTLTMlBOIWqpwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.195.149", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "bec9f0639e800fe66298c98fb4225223", "proto": "ssl", "xff": "", "alarm_id": "20241127_30ddd0930a1c2b1fae9f81972acffe87", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645080", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.195.149", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网郴州供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64964", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645119", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645119, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 169, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 149, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 230, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64238, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "149", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADYA2YAAHwGRAusH38CL2CcLfruAbs14WwYBeRc8VAYAER5OAAAFgMBAKsBAACnAwPLQ8KDacnvCB67HvxUUiEk0NH4p8IVVrpEca6zex5EzQAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADYA2YAAHwGRAusH38CL2CcLfruAbs14WwYBeRc8VAYAER5OAAAFgMBAKsBAACnAwPLQ8KDacnvCB67HvxUUiEk0NH4p8IVVrpEca6zex5EzQAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645080", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "169", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "230", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64238", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645117", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645117, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58886, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsZAAHsGCjOsEkLVeBvvAeYGAbtW3PxDTcO4+FAYAgNnIwAAFgMBAM0BAADJAwN6ng9Ab9kks6v5ksEPk26OaGEuVim6Y6g0wHzXO9Wy/gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:37", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsZAAHsGCjOsEkLVeBvvAeYGAbtW3PxDTcO4+FAYAgNnIwAAFgMBAM0BAADJAwN6ng9Ab9kks6v5ksEPk26OaGEuVim6Y6g0wHzXO9Wy/gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.213", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9d5b193369226922c2ed140df2910ba", "proto": "ssl", "xff": "", "alarm_id": "20241127_d68e36c9c093808e1660b2a7bad3d1db", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:37", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645080", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58886", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645114", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645114, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 50440, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv3D1AAHwGeiasE+EPL2LrH8UIAbtoZZhDS6e111AYBAEu1QAAFgMBAMIBAAC+AwMm29B2YL3AOd/KTFiH/elmqcCmpnx19WRf7tyeHVMK3QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv3D1AAHwGeiasE+EPL2LrH8UIAbtoZZhDS6e111AYBAEu1QAAFgMBAMIBAAC+AwMm29B2YL3AOd/KTFiH/elmqcCmpnx19WRf7tyeHVMK3QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.225.15", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "afa7f0d50d4b810ec04daadb58570ba5", "proto": "ssl", "xff": "", "alarm_id": "20241127_c4d2d8ac5125f291cfde4357a193c178", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645080", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "50440", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645114", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645114, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 57658, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "19dddc47ab405e6e450facfaf97ac562", "proto": "ssl", "xff": "", "alarm_id": "20241127_386981aec1411ea54a4f50e4624a555c", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645080", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "57658", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645114", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645114, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58000, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8BLgAAD4R3O6sH2IFrB/gxuKQADUAKOWx5qABAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8BLgAAD4R3O6sH2IFrB/gxuKQADUAKOWx5qABAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9920e327d0946f3e29939bbb2705084", "proto": "dns", "xff": "", "alarm_id": "20241127_d06efc8691f278ccc16c667c8712da50", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645118", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58000", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645114", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645114, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 57658, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9920e327d0946f3e29939bbb2705084", "proto": "ssl", "xff": "", "alarm_id": "20241127_d06efc8691f278ccc16c667c8712da50", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645118", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "57658", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645108", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645108, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.143", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64841, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvP/dAADwGsm+sE4OPdh+l4P1JAbtfwdV9pPKEkFAYBAHtYQAAFgMBAMIBAAC+AwMQY2mAIC2cVhka4b/Yk6Nbbya4FbwRQHh3GQi+TRXY9AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:28", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvP/dAADwGsm+sE4OPdh+l4P1JAbtfwdV9pPKEkFAYBAHtYQAAFgMBAMIBAAC+AwMQY2mAIC2cVhka4b/Yk6Nbbya4FbwRQHh3GQi+TRXY9AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.143", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8126884080d9bcfa172930c019606aca", "proto": "ssl", "xff": "", "alarm_id": "20241127_c3e43f612ed5f5f4d18b5153c434ae38", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:28", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.143", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64841", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645103", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645103, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 6427, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6E2pAADwGGf+sE5j0L2CcLRkbAbsxb5F8rPGnqFAYAgMs6gAAFgMBAM0BAADJAwOLggrSIYitWmy5hPl3hFo3DLxRskoVl398UQ/74guzWgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:23", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6E2pAADwGGf+sE5j0L2CcLRkbAbsxb5F8rPGnqFAYAgMs6gAAFgMBAM0BAADJAwOLggrSIYitWmy5hPl3hFo3DLxRskoVl398UQ/74guzWgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.152.244", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "42439089e6036890825644d25e52c48a", "proto": "ssl", "xff": "", "alarm_id": "20241127_7882c0937d8c94c2b577a53837454bf3", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:23", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "6427", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645103", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645103, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.161.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62930, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvanpAAHwGiuOsE6ECL2KMM/XSAbsTmxPbC959e1AYAQEJQwAAFgMBAMIBAAC+AwPX1AFq0IwbTFt9NMQOvL/03KGuJEBh4QG+ChPSW7T48gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:23", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvanpAAHwGiuOsE6ECL2KMM/XSAbsTmxPbC959e1AYAQEJQwAAFgMBAMIBAAC+AwPX1AFq0IwbTFt9NMQOvL/03KGuJEBh4QG+ChPSW7T48gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.161.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "01bcfe71a631f1d7315947aa1255bc03", "proto": "ssl", "xff": "", "alarm_id": "20241127_08a209378198dd83433db782b3890895", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:23", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.161.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62930", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645101", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645101, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62530, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6AWIAAHwGRe2sH38CL2CcLfRCAbsbrqA9rKgPMFAYETAYHgAAFgMBAM0BAADJAwPRzzCXRPdYy2/ATsSQMQ+FbnawSH+kftJLgZY6hkolnwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:21", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6AWIAAHwGRe2sH38CL2CcLfRCAbsbrqA9rKgPMFAYETAYHgAAFgMBAM0BAADJAwPRzzCXRPdYy2/ATsSQMQ+FbnawSH+kftJLgZY6hkolnwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:21", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62530", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645098", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645098, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.67.86", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 53566, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvXXdAAHsGmq6sEENWL2LoGtE+Abvv4bBs+5qOh1AYQHGQqgAAFgMBAMIBAAC+AwOA80uLkvylrORMjb2c3QI5RHZTyD8+HBXf2lWI34660AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:18", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvXXdAAHsGmq6sEENWL2LoGtE+Abvv4bBs+5qOh1AYQHGQqgAAFgMBAMIBAAC+AwOA80uLkvylrORMjb2c3QI5RHZTyD8+HBXf2lWI34660AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.67.86", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "30a7a67256e6acead2bd19a7cd04e68d", "proto": "ssl", "xff": "", "alarm_id": "20241127_a956d34912d0431d91709a50b83cc1e1", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:18", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.67.86", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "53566", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645094", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645094, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 49540, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6bp9AAHwGwnisE4OyeccjWcGEAbtd1vrGBvBUD1AYBAEdjAAAFgMBAM0BAADJAwOKkaIIZgETMhj0Rrbefu3FpGDmmm2wPqdYU0zP/91rWAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:14", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6bp9AAHwGwnisE4OyeccjWcGEAbtd1vrGBvBUD1AYBAEdjAAAFgMBAM0BAADJAwOKkaIIZgETMhj0Rrbefu3FpGDmmm2wPqdYU0zP/91rWAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.178", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "3ee27315417c85222dadb13e0622d797", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf189f31c7f0ed6dd0ffda7a9f5732d0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:14", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "49540", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645089", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645089, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.64.7", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 55160, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvqiBAAHwGS86sE0AHdh+l4Nd4AbsgdQEyUeZDFlAYAgPJLgAAFgMBAMIBAAC+AwPVedinnS0jLa2BFzow+X+viWwtZnYFGaYKxZbrEOVDGwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:09", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvqiBAAHwGS86sE0AHdh+l4Nd4AbsgdQEyUeZDFlAYAgPJLgAAFgMBAMIBAAC+AwPVedinnS0jLa2BFzow+X+viWwtZnYFGaYKxZbrEOVDGwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.64.7", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "66d44324e672f44b56b9a8dc363cd579", "proto": "ssl", "xff": "", "alarm_id": "20241127_333a9bc235d7a2d611c91edd2cc024fb", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:09", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.64.7", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "55160", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645088", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645088, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.137.36", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 56165, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6crFAADwGLvisE4kkeBvvAdtlAbv/PvsrA5ckP1AYAgPMrAAAFgMBAM0BAADJAwM/SswrbMKFCLv46tQ55ECBSGnBJ9zUryHL7I4mZHyP2AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:08", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6crFAADwGLvisE4kkeBvvAdtlAbv/PvsrA5ckP1AYAgPMrAAAFgMBAM0BAADJAwM/SswrbMKFCLv46tQ55ECBSGnBJ9zUryHL7I4mZHyP2AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.137.36", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a9e2f4a363ab642004938d63719f2531", "proto": "ssl", "xff": "", "alarm_id": "20241127_28aebe519c0ba88c41f6ca8ae97659d8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:08", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.137.36", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "56165", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645087", "vlan_id": "", "vuln_type": "ISC BIND 输入验证漏洞", "attack_type": "拒绝服务", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "8.8.8.8", "sip_group": "", "repeat_count": "1", "type": "其他拒绝服务", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645087, "rule_name": "ISC BIND 输入验证漏洞", "hit_field": "", "description": "1", "dip": "8.8.8.8", "protocol_id": 17, "hit_end": 74, "uri": "", "cnnvd_id": "CNNVD-201406-297", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 54, "detail_info": "ISC BIND是美国Internet Systems Consortium(ISC)公司所维护的一套实现了DNS协议的开源软件。<br/>ISC BIND 9.10.0版本的libdns中存在安全漏洞,该漏洞源于程序没有正确处理EDNS选项。远程攻击者可通过发送特制的数据包利用该漏洞造成拒绝服务(REQUIRE声明失败和守护进程退出)。", "packet_size": 308, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.224.199", "attack_method": "远程", "affected_system": "", "sig_id": 33591303, "sport": 57768, "bulletin": "目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:\r<a href=\"https://kb.isc.org/article/AA-01166/\" target=\"_blank\" rel=\"nofollow\">https://kb.isc.org/article/AA-01166/</a>"}, "hit_start": "54", "skyeye_id": "", "payload": {"packet_data": "ACSs3Z37AJShXm6HCABFAAEmYbEAADYRhR8ICAgIrB/gxwA14agBElh6qC+BggABAAAAAAABAjkxAjcxAzEzNAI2MQdpbi1hZGRyBGFycGEAAAwAAQAAKQIAAACAAADUAA8AQQAXWzIwMi4xMDAuNjQuODFdIHJjb2RlPVJFRlVTRUQgZm9yIDkxLjcxLjEzNC42MS5pbi1hZGRyLmFycGEvcHRyAA8APwAXWzYxLjE3OC4wLjk0XSByY29kZT1SRUZVU0VEIGZvciA5MS43MS4xMzQuNjEuaW4tYWRkci5hcnBhL3B0cgAPAEgAFkF0IGRlbGVnYXRpb24gNzEuMTM0LjYxLmluLWFkZHIuYXJwYSBmb3IgOTEuNzEuMTM0LjYxLmluLWFkZHIuYXJwYS9wdHI="}, "detail_info": "ISC BIND是美国Internet Systems Consortium(ISC)公司所维护的一套实现了DNS协议的开源软件。<br/>ISC BIND 9.10.0版本的libdns中存在安全漏洞,该漏洞源于程序没有正确处理EDNS选项。远程攻击者可通过发送特制的数据包利用该漏洞造成拒绝服务(REQUIRE声明失败和守护进程退出)。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:07", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "ISC BIND 输入验证漏洞", "packet_data": "ACSs3Z37AJShXm6HCABFAAEmYbEAADYRhR8ICAgIrB/gxwA14agBElh6qC+BggABAAAAAAABAjkxAjcxAzEzNAI2MQdpbi1hZGRyBGFycGEAAAwAAQAAKQIAAACAAADUAA8AQQAXWzIwMi4xMDAuNjQuODFdIHJjb2RlPVJFRlVTRUQgZm9yIDkxLjcxLjEzNC42MS5pbi1hZGRyLmFycGEvcHRyAA8APwAXWzYxLjE3OC4wLjk0XSByY29kZT1SRUZVU0VEIGZvciA5MS43MS4xMzQuNjEuaW4tYWRkci5hcnBhL3B0cgAPAEgAFkF0IGRlbGVnYXRpb24gNzEuMTM0LjYxLmluLWFkZHIuYXJwYSBmb3IgOTEuNzEuMTM0LjYxLmluLWFkZHIuYXJwYS9wdHI=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "CNNVD-201406-297", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.224.199", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a1983eddee91bfc9a200a7ddb219706f", "proto": "dns", "xff": "", "alarm_id": "20241127_64f98bba48fa54dd3597af13dd966e40", "attack_chain": "0x02030000", "access_time": "2024-11-27 02:18:07", "attack_addr": "美国(39.765054/-101.407912)", "type_chain": "15040000", "description": "1", "dip_addr": "美国", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645089", "branch_id": "QbJK/5PW2", "att_ck": "影响:TA0040|网络拒绝服务:T1498", "sip": "172.31.224.199", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "中", "super_type": "拒绝服务", "super_attack_chain": "0x02000000", "hit_end": "74", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "tcp_option": "", "rule_id": "0x3cbe", "attack_org": "", "is_white": "0", "packet_size": "308", "alarm_sample": "1", "appid": "130", "attack_sip": "8.8.8.8", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "15550-ISC BIND 输入验证漏洞", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1498\"}]}]}}", "sig_id": "33591303", "host_md5": "", "sport": "57768", "bulletin": "目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:\r<a href=\"https://kb.isc.org/article/AA-01166/\" target=\"_blank\" rel=\"nofollow\">https://kb.isc.org/article/AA-01166/</a>"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645086", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645086, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.22", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58507, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE54CBAAHsGxFasEREWeccjWeSLAbtf1Il+2U3yNlAYAgObqQAAFgMBAQwBAAEIAwNevF8GPwnhQ2phC/qsUmwn5vBNO3mXEoifNHgDkhNQnyDCfKW7/uV3SHyQyRnnKIZvTfEAV3/u8Gj33PKsydZHqwAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIHPdNcV8E1VwLHhNQvG1aHcoY78BZhPJzfvQJGrNtNBs"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:06", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE54CBAAHsGxFasEREWeccjWeSLAbtf1Il+2U3yNlAYAgObqQAAFgMBAQwBAAEIAwNevF8GPwnhQ2phC/qsUmwn5vBNO3mXEoifNHgDkhNQnyDCfKW7/uV3SHyQyRnnKIZvTfEAV3/u8Gj33PKsydZHqwAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIHPdNcV8E1VwLHhNQvG1aHcoY78BZhPJzfvQJGrNtNBs", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.22", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "afdd395dca7e1086eab8f0d5794f167f", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf73c6d2e940702824d17fb7f9d74ff5", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:06", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645050", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.22", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58507", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645080", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645080, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 169, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 149, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 230, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64991, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "149", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADY5CMAAHwGY02sH38CL2CcLf3fAbv12jbhdFMHelAYAESX3QAAFgMBAKsBAACnAwPIYEXDkSiPkDfPOE5YtyBT4/1Mu91yBG/uV42LnpOZRQAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:00", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADY5CMAAHwGY02sH38CL2CcLf3fAbv12jbhdFMHelAYAESX3QAAFgMBAKsBAACnAwPIYEXDkSiPkDfPOE5YtyBT4/1Mu91yBG/uV42LnpOZRQAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:18:00", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645020", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "169", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "230", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64991", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645080", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645080, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33992, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD41VxAAD4GalKsH1ABbxeRGYTIdTBFELeE3QtOtoAYBbREbAAAAQEICgzqYjQ/jwmMbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZGQ5ZDQ0ZDYzNTIzYTU2NGVlZWFhYjQzZmUxMWQ2NGUiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwNzIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:18:00", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD41VxAAD4GalKsH1ABbxeRGYTIdTBFELeE3QtOtoAYBbREbAAAAQEICgzqYjQ/jwmMbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZGQ5ZDQ0ZDYzNTIzYTU2NGVlZWFhYjQzZmUxMWQ2NGUiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwNzIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:18:00", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645089", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33992", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645071", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "222.246.129.80", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645071, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "222.246.129.80", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 85, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58736, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "AJShXm6HACSs3Z37CABFAABHYJMAAHoR8uWsH+DG3vaBUOVwADUAM+00wHQBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:51", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "AJShXm6HACSs3Z37CABFAABHYJMAAHoR8uWsH+DG3vaBUOVwADUAM+00wHQBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.224.198", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "4e2651baadd40a1e467f7883a47fcea8", "proto": "dns", "xff": "", "alarm_id": "20241127_de9a08f2acf9a270b7b5627ae1230d53", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:51", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645059", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "85", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58736", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645071", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网益阳供电公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645071, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62838, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvdKJAAHoGGTKsEaojdh+l4PV2Abt1fSHaSwSQX1AYAgOzigAAFgMBAMIBAAC+AwPELs1f/4XrWgUE/oFJtZ/hZJNnefe6f+xUX70Ftm4ezQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:51", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvdKJAAHoGGTKsEaojdh+l4PV2Abt1fSHaSwSQX1AYAgOzigAAFgMBAMIBAAC+AwPELs1f/4XrWgUE/oFJtZ/hZJNnefe6f+xUX70Ftm4ezQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.170.35", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "6138f40c715cefd905252ce0c895d066", "proto": "ssl", "xff": "", "alarm_id": "20241127_bce1ecd59f244780b0f539ad8c5c3162", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:51", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645020", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网益阳供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62838", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645062", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645062, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59787, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:42", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "f8eba9906c98535438f9dc02bc488eaa", "proto": "ssl", "xff": "", "alarm_id": "20241127_193b8414a0b293024c46405757431ac8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:42", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645020", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59787", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645062", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.199", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645062, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.199", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 55418, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8HNwAAD4R5JSsH0I6rB/gx9h6ADUAKPi0/X0BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:42", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8HNwAAD4R5JSsH0I6rB/gx9h6ADUAKPi0/X0BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "dns", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:42", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645059", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "55418", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645062", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645062, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59787, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:42", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAHPHN9AAD4GFW+sH0I6L2LrH+mLAbs3+FpdnKct/lAYQHGsewAAFgMBAaIBAAGeAwNnRhDIWYiewelN4X9Y84iK/ZNceYko0w4HgNZdtD9DLAABGgD/wCzAMACfwK3An8AkwCgAa8AKwBQAOcCvwKPAh8CLwH3Ac8B3AMQAiMArwC8AnsCswJ7AI8AnAGfACcATADPArsCiwIbAisB8wHLAdgC+AEXACMASABYAq8CnwDgAs8A2AJHAkcCbwJfAqwCqwKbANwCywDUAkMCQwJbAmsCqwDQAjwCdwJ0APQA1wDLAKsAPwC7AJsAFwKHAewDAAITAjcB5wInAdQCcwJwAPAAvwDHAKcAOwC3AJcAEwKDAegC6AEHAjMB4wIjAdAAKwA3AAwCtALcAlcCTwJkArAC2AJTAksCYAJMAqcClAK8AjcCPwJXAqQCowKQArgCMwI7AlMCoAIvAB8ARwDMAjgAFAATADMACAJIAigEAAFsAAAATABEAAA5zbGFwaS5vcmF5Lm5ldAANABoAGAYBBQEEAQMBAgEBAQYDBQMEAwMDAgMBAwAKABgAFgAZABwAGAAbABcAFgAaABUAFAATABIACwACAQAAIwAA", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "ssl", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:42", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645059", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59787", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645060", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645060, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33990, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4oVFAAD4Gnl2sH1ABbxeRGYTGdTAybvtGB/7kwIAYBbSIQQAAAQEICgzqWmI/jwG6bwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYWRkMDdjMzNhYThlN2JjMDUwZDBlODM1ZTA3MTQxOGIiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwNTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:40", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4oVFAAD4Gnl2sH1ABbxeRGYTGdTAybvtGB/7kwIAYBbSIQQAAAQEICgzqWmI/jwG6bwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYWRkMDdjMzNhYThlN2JjMDUwZDBlODM1ZTA3MTQxOGIiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwNTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:17:40", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645059", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33990", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645054", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "192.168.8.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645054, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "192.168.8.1", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 86, "appid": 130, "proto": "dns", "xff": "", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 39571, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsutUI9N6vhq8WCABFAABIyC5AAD8R/o6sHgAgwKgIAZqTADUANNak6J4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0C2xvY2FsZG9tYWluAAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsutUI9N6vhq8WCABFAABIyC5AAD8R/o6sHgAgwKgIAZqTADUANNak6J4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0C2xvY2FsZG9tYWluAAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.30.0.32", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "f115a88fdb41ce2de132509cacf8f639", "proto": "dns", "xff": "", "alarm_id": "20241127_206e55a7a6e4c38e643cb02d12cdba4f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645059", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "f4:de:af:86:af:16", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:24:ac:ba:d5:08", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "86", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "39571", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645054", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "192.168.8.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645054, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "192.168.8.1", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 86, "appid": 130, "proto": "dns", "xff": "", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 39571, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAABIyC5AADsRAo+sHgAgwKgIAZqTADUANNak6J4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0C2xvY2FsZG9tYWluAAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:34", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAABIyC5AADsRAo+sHgAgwKgIAZqTADUANNak6J4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0C2xvY2FsZG9tYWluAAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.30.0.32", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "0971b21677c404fe7dcfd430656637aa", "proto": "dns", "xff": "", "alarm_id": "20241127_9749b85d241b3735c320ce1cc80d603c", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:34", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732645020", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "86", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "39571", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645047", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645047, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 331, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 6417, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE9E2RAADwGGcKsE5j0L2CcLRkRAbuCEYUccGpdmVAYAgM+UwAAFgMBARABAAEMAwMCoh2L0INYQjex6Ze3Mje5OSjwj6fQYFQcwnI/zziDXCD95l4tkgsN0SuyGyzkwlTxtP+9eOgntrdlktdtNYkg7wAmzKnMqMArwC/ALMAwwAnAE8AKwBQAnACdAC8ANcASAAoTAxMBEwIBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACDq7YvGgF+ksLbH93SkXCKwnxahangO/S7k6cL8DrBtQg=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:27", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE9E2RAADwGGcKsE5j0L2CcLRkRAbuCEYUccGpdmVAYAgM+UwAAFgMBARABAAEMAwMCoh2L0INYQjex6Ze3Mje5OSjwj6fQYFQcwnI/zziDXCD95l4tkgsN0SuyGyzkwlTxtP+9eOgntrdlktdtNYkg7wAmzKnMqMArwC/ALMAwwAnAE8AKwBQAnACdAC8ANcASAAoTAxMBEwIBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACDq7YvGgF+ksLbH93SkXCKwnxahangO/S7k6cL8DrBtQg==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.152.244", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "42439089e6036890825644d25e52c48a", "proto": "ssl", "xff": "", "alarm_id": "20241127_7882c0937d8c94c2b577a53837454bf3", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:27", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "331", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "6417", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645045", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645045, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.173.29", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61332, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv0fdAAHoGvWasEK0dL2LoGu+UAbs92tD4keZx71AYBAE0JAAAFgMBAMIBAAC+AwPr1YiCVJrMRE4vKidHT4Ee9WskByh1BPOvELvi1CYe1QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:25", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv0fdAAHoGvWasEK0dL2LoGu+UAbs92tD4keZx71AYBAE0JAAAFgMBAMIBAAC+AwPr1YiCVJrMRE4vKidHT4Ee9WskByh1BPOvELvi1CYe1QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.173.29", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "796a57e66991bbf62cb03bb407c2036a", "proto": "ssl", "xff": "", "alarm_id": "20241127_9ef9c129a1f5b2a328ec4045d870c56e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:25", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.173.29", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61332", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645045", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645045, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.248.15", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 53917, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvS9xAADsGNIusEPgPL2LrH9KdAbvrwa7eQJsW9lAYQHF1twAAFgMBAMIBAAC+AwOrW8jer9HGkw9Kct+LOWcDUaA98bXeQ9QkXso/trtgkwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:25", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvS9xAADsGNIusEPgPL2LrH9KdAbvrwa7eQJsW9lAYQHF1twAAFgMBAMIBAAC+AwOrW8jer9HGkw9Kct+LOWcDUaA98bXeQ9QkXso/trtgkwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.248.15", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "310072c7a97ea0311bac75b27fe12ab1", "proto": "ssl", "xff": "", "alarm_id": "20241127_f134de613853cd908af7063cdc529c1a", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:25", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.248.15", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "53917", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645044", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645044, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.69", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 50954, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6brhAAHsGBM6sEkJFeccjWccKAbsTbyOlYVlYlFAYAQGoxAAAFgMBAM0BAADJAwNTO7pmlzjAbqqhuaiGxIfsCtzv5+uwPWNwRTr60uvplgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:24", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6brhAAHsGBM6sEkJFeccjWccKAbsTbyOlYVlYlFAYAQGoxAAAFgMBAM0BAADJAwNTO7pmlzjAbqqhuaiGxIfsCtzv5+uwPWNwRTr60uvplgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.69", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "130a8bbc5c4d760eb2e8e27fd3460c4b", "proto": "ssl", "xff": "", "alarm_id": "20241127_69be984f501f74e8188d45e6a817a792", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:24", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.69", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "50954", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645044", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "192.168.8.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645044, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "192.168.8.1", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 37695, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAA8oRRAADsRKbWsHgAgwKgIAZM/ADUAKDdMCnsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:24", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAA8oRRAADsRKbWsHgAgwKgIAZM/ADUAKDdMCnsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.30.0.32", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "0971b21677c404fe7dcfd430656637aa", "proto": "dns", "xff": "", "alarm_id": "20241127_9749b85d241b3735c320ce1cc80d603c", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:24", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "37695", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645044", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "192.168.8.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645044, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "192.168.8.1", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 37695, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsutUI9N6vhq8WCABFAAA8oRRAAD8RJbWsHgAgwKgIAZM/ADUAKDdMCnsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:24", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsutUI9N6vhq8WCABFAAA8oRRAAD8RJbWsHgAgwKgIAZM/ADUAKDdMCnsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.30.0.32", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "f115a88fdb41ce2de132509cacf8f639", "proto": "dns", "xff": "", "alarm_id": "20241127_206e55a7a6e4c38e643cb02d12cdba4f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:24", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645029", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.30.0.32", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "f4:de:af:86:af:16", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:24:ac:ba:d5:08", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "37695", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645043", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网湘潭供电公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645043, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.173.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 55121, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6PitAADoGQZ+sEa0FeBvvAddRAbuEO6o42Z8LfVAYAQG09QAAFgMBAM0BAADJAwM0ao+SmK/csrPNARFsYIq97A0CQxb7JDNOEKrucLon1wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:23", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6PitAADoGQZ+sEa0FeBvvAddRAbuEO6o42Z8LfVAYAQG09QAAFgMBAM0BAADJAwM0ao+SmK/csrPNARFsYIq97A0CQxb7JDNOEKrucLon1wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.173.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "0ff7723a1684f774b5931edf7f2905dd", "proto": "ssl", "xff": "", "alarm_id": "20241127_0eab744094c76e23729d56341cdc473a", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:23", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.173.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网湘潭供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "55121", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645042", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645042, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 19294, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE540hAADsGNx2sEREreBvvAUteAbuAd4A3eeobblAYBAFkhwAAFgMBAQwBAAEIAwMzrj2jIkQWORGlSfmkS5QHLkcV9YgrglFFsXwS4xqktSDpnk6DLmEwfcFZL9Wq2Pscu3pBtCprEtZ5s6RkCp2yxAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIPADH/uosjOrVWqhMhzll/c8ISD+zTAV2+ZUpWfrHH0P"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:22", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE540hAADsGNx2sEREreBvvAUteAbuAd4A3eeobblAYBAFkhwAAFgMBAQwBAAEIAwMzrj2jIkQWORGlSfmkS5QHLkcV9YgrglFFsXwS4xqktSDpnk6DLmEwfcFZL9Wq2Pscu3pBtCprEtZ5s6RkCp2yxAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIPADH/uosjOrVWqhMhzll/c8ISD+zTAV2+ZUpWfrHH0P", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.43", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "928bfe2f28ea05d4c3f222997cfe925d", "proto": "ssl", "xff": "", "alarm_id": "20241127_7b49d204432a5ebd3e7dc7f6691a8e9e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:22", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "19294", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645040", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645040, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 63643, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvlOpAAHwGF2OsE4smL2LrH/ibAbvVtbdqgHT8R1AYBAHVaAAAFgMBAMIBAAC+AwPeATEv6rn04Cevr1S8Q+uHngk7S4MwtyTc6/lAz2zDZAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:20", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvlOpAAHwGF2OsE4smL2LrH/ibAbvVtbdqgHT8R1AYBAHVaAAAFgMBAMIBAAC+AwPeATEv6rn04Cevr1S8Q+uHngk7S4MwtyTc6/lAz2zDZAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.139.38", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "11df88f2a661fda8f11a87e5ee1fac45", "proto": "ssl", "xff": "", "alarm_id": "20241127_2db4169ded47ee2744dbef301e578b59", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:20", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "63643", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645036", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645036, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.152.138", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 20889, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvr4ZAADwGLeWsE5iKdh+l4FGZAbvhkOKhdGwNBlAYAQFgaAAAFgMBAMIBAAC+AwNwLmsxBEl+LmuZFJ9YmstxcCGju3yj0R6SEPYqBaZRewAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:16", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvr4ZAADwGLeWsE5iKdh+l4FGZAbvhkOKhdGwNBlAYAQFgaAAAFgMBAMIBAAC+AwNwLmsxBEl+LmuZFJ9YmstxcCGju3yj0R6SEPYqBaZRewAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.152.138", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "1c4ebd1f75a68aff2204e69540364cbd", "proto": "ssl", "xff": "", "alarm_id": "20241127_3d7a2c344c0f7326693eb35a4ffada6f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:16", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.152.138", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "20889", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645033", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732645033, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "121.37.225.23", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65349}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 02:17:13", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "121.37.225.23", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "8b818961b59bba088f2899b41b00b646", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644976", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "121.37.225.23", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY29tDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjo1NCBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni40NDs4Mzs="}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.44;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_78e340b36f8712d504a12b4ff521791c", "access_time": "2024-11-27 02:17:13", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--广东省--广州市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:54 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65349", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645033", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645033, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 63286, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADve6VAAHsGqNKsH2IUL2Oc+vc2Abu7yAiRsKQyDFAYQHHS5QAAFgMBAMIBAAC+AwMAQ/Ep8QjqLIqPF4PQ+ag7RsqCb1uzcGz8KGkVtczGlQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:13", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADve6VAAHsGqNKsH2IUL2Oc+vc2Abu7yAiRsKQyDFAYQHHS5QAAFgMBAMIBAAC+AwMAQ/Ep8QjqLIqPF4PQ+ag7RsqCb1uzcGz8KGkVtczGlQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "b48b3eebe83078a68a8b1ceb54f99d82", "proto": "ssl", "xff": "", "alarm_id": "20241127_a807a0161f2804b0f2d69ab9558b9145", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:13", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "63286", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645033", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645033, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 53809, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8e6IAAH4RJfWsH2IUrB/gxtIxADUAKMnQEtIBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:13", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8e6IAAH4RJfWsH2IUrB/gxtIxADUAKMnQEtIBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "5581a7fd7b777b17b8e6c4b2c07fa257", "proto": "dns", "xff": "", "alarm_id": "20241127_760f656d1176a5f29e3a3e61e2d23eb0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:13", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645029", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "53809", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645033", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645033, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 63286, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAADve6VAAH4GpdKsH2IUL2Oc+vc2Abu7yAiRsKQyDFAYQHHS5QAAFgMBAMIBAAC+AwMAQ/Ep8QjqLIqPF4PQ+ag7RsqCb1uzcGz8KGkVtczGlQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:13", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAADve6VAAH4GpdKsH2IUL2Oc+vc2Abu7yAiRsKQyDFAYQHHS5QAAFgMBAMIBAAC+AwMAQ/Ep8QjqLIqPF4PQ+ag7RsqCb1uzcGz8KGkVtczGlQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "5581a7fd7b777b17b8e6c4b2c07fa257", "proto": "ssl", "xff": "", "alarm_id": "20241127_760f656d1176a5f29e3a3e61e2d23eb0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:13", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645029", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "63286", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645031", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645031, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.173.131", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58111, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvk3FAADoGl22sEa2DL2KMM+L/AbuXyNVwm3Kk21AYAgMfmQAAFgMBAMIBAAC+AwNxYqZuGdmn+i7GAgk4yFn1SrB9q1S9+w9e6t2GgGrIcwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:11", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvk3FAADoGl22sEa2DL2KMM+L/AbuXyNVwm3Kk21AYAgMfmQAAFgMBAMIBAAC+AwNxYqZuGdmn+i7GAgk4yFn1SrB9q1S9+w9e6t2GgGrIcwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.173.131", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "cbdb1fb8dc0d67ac451ca060d40b6e09", "proto": "ssl", "xff": "", "alarm_id": "20241127_b9a76eafdb867516b8d688bbbcfd31ef", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:11", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.173.131", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58111", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645031", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网湖南防灾减灾中心", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645031, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.206", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62977, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD61VBAADsG3aysEkLOeccjWfYBAbsYY6ER+4qQRVAYAgNThAAAFgMBAM0BAADJAwO+ZdhdaDFeKCW4DJCryYCLXBmdIFUXql77SCHcaKOkfAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:11", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD61VBAADsG3aysEkLOeccjWfYBAbsYY6ER+4qQRVAYAgNThAAAFgMBAM0BAADJAwO+ZdhdaDFeKCW4DJCryYCLXBmdIFUXql77SCHcaKOkfAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.206", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "85bea28033526c31b657b869bc47b1c4", "proto": "ssl", "xff": "", "alarm_id": "20241127_d6240e1ac253c9d798142697be448317", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:11", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.206", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网湖南防灾减灾中心", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62977", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645031", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645031, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 49538, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6bpxAAHwGwnusE4OyeccjWcGCAbvA3fRl+MvxxlAYBAGQoQAAFgMBAM0BAADJAwMrxW7RE1SB0RUa4bbkX8mRBH7T/Vr6a0ie0CCatljjCAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:11", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6bpxAAHwGwnusE4OyeccjWcGCAbvA3fRl+MvxxlAYBAGQoQAAFgMBAM0BAADJAwMrxW7RE1SB0RUa4bbkX8mRBH7T/Vr6a0ie0CCatljjCAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.178", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "3ee27315417c85222dadb13e0622d797", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf189f31c7f0ed6dd0ffda7a9f5732d0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:11", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "49538", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645030", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645030, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 19286, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6pMtAADsGEWmsERErL2CcLUtWAbsf7JakmwWC4VAYBAFnUwAAFgMBAM0BAADJAwNBQhRGabEsTst/iz3ovr0w0mtc99b//WsOKpgaT4Pf7AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:10", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6pMtAADsGEWmsERErL2CcLUtWAbsf7JakmwWC4VAYBAFnUwAAFgMBAM0BAADJAwNBQhRGabEsTst/iz3ovr0w0mtc99b//WsOKpgaT4Pf7AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.43", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "928bfe2f28ea05d4c3f222997cfe925d", "proto": "ssl", "xff": "", "alarm_id": "20241127_7b49d204432a5ebd3e7dc7f6691a8e9e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:10", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "19286", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645030", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645030, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 63638, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6l1RAAHwGY+KsE4smL2CcLfiWAbuBcFzyUMyuRVAYBAHVLgAAFgMBAM0BAADJAwMLt9VTdFY9yfR/FgoyuZ5/+zyM27WVmCgAQYtZgwtXsAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:10", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6l1RAAHwGY+KsE4smL2CcLfiWAbuBcFzyUMyuRVAYBAHVLgAAFgMBAM0BAADJAwMLt9VTdFY9yfR/FgoyuZ5/+zyM27WVmCgAQYtZgwtXsAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.139.38", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "11df88f2a661fda8f11a87e5ee1fac45", "proto": "ssl", "xff": "", "alarm_id": "20241127_2db4169ded47ee2744dbef301e578b59", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:10", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "63638", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645030", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645030, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.126.110", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61749, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvAABAAHkGCh6sH35uL2Oc+vE1AbvHC3VpD2ycpFAYAgEI9QAAFgMBAMIBAAC+AwOCDwb6pRMB2EmAMt52UzNsCqtxA3tV88ouPq69/2XOUQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:10", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvAABAAHkGCh6sH35uL2Oc+vE1AbvHC3VpD2ycpFAYAgEI9QAAFgMBAMIBAAC+AwOCDwb6pRMB2EmAMt52UzNsCqtxA3tV88ouPq69/2XOUQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.126.110", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "4314906ce10b688498c9865cdffd95e5", "proto": "ssl", "xff": "", "alarm_id": "20241127_56dc9a5c9a5ddb9cafb1cdf2321b1131", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:10", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644990", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.126.110", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61749", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645023", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732645023, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "120.76.40.171", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65346}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 02:17:03", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "120.76.40.171", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "1d12dd1e7c195b6f4b73dd444fc332c9", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644964", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "120.76.40.171", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY29tDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNzowMyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjc1LjE3Mjs4Mzs="}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.75.172;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_80ade8e70232dce763d1f32fe97ae828", "access_time": "2024-11-27 02:17:03", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--广东省--深圳市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:17:03 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65346", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645021", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645021, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.176.17", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59369, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6Ta9AAHoG7w6sEbAReBvvAefpAbsiaB08ohauL1AYAgOWhAAAFgMBAM0BAADJAwP6RybVhHtR5nmuy+X4OH43Efi3wycg6sqSf4sGKdk7bwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:01", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6Ta9AAHoG7w6sEbAReBvvAefpAbsiaB08ohauL1AYAgOWhAAAFgMBAM0BAADJAwP6RybVhHtR5nmuy+X4OH43Efi3wycg6sqSf4sGKdk7bwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.176.17", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "eedc734b4f9e3a8b6c675cc62dd5a622", "proto": "ssl", "xff": "", "alarm_id": "20241127_0fe9caab65e76e9bd08c3276eaad9dfa", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:01", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.176.17", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59369", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645020", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645020, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.174.8", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 60914, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv5M5AAHoGpp6sEa4IL2LrH+3yAbuK7X+W+ilqhFAYAgPo/AAAFgMBAMIBAAC+AwM8PWK8qJlxoUqC8MQIXsR1uXSp9Y8ho69zGXGD6DKjWQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:00", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv5M5AAHoGpp6sEa4IL2LrH+3yAbuK7X+W+ilqhFAYAgPo/AAAFgMBAMIBAAC+AwM8PWK8qJlxoUqC8MQIXsR1uXSp9Y8ho69zGXGD6DKjWQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.174.8", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "fff0a80e8af9ba390c8ff879b2bd80f5", "proto": "ssl", "xff": "", "alarm_id": "20241127_eee77066c8047145f4ef62d1c3e9834c", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:00", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.174.8", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "60914", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645020", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645020, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33985, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4PfpAAD4GAbWsH1ABbxeRGYTBdTAM/3djRZOWF4AYBbRBTQAAAQEICgzqSr0/jvIVbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYTNhNTJlYTE4MjkwYTExNWYyNWFjMWVkMjhmMDY1N2IiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwMTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:00", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4PfpAAD4GAbWsH1ABbxeRGYTBdTAM/3djRZOWF4AYBbRBTQAAAQEICgzqSr0/jvIVbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYTNhNTJlYTE4MjkwYTExNWYyNWFjMWVkMjhmMDY1N2IiLCJ0aW1lc3RhbXAiOjE3MzI2NDUwMTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:17:00", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645029", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33985", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645020", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "222.246.129.80", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645020, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "222.246.129.80", "protocol_id": 17, "hit_end": 68, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 48, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 85, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 57545, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "48", "skyeye_id": "", "payload": {"packet_data": "AJShXm6HACSs3Z37CABFAABHM+IAAHoRH5esH+DG3vaBUODJADUAM5mqGKYBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:17:00", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "AJShXm6HACSs3Z37CABFAABHM+IAAHoRH5esH+DG3vaBUODJADUAM5mqGKYBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.224.198", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "4e2651baadd40a1e467f7883a47fcea8", "proto": "dns", "xff": "", "alarm_id": "20241127_de9a08f2acf9a270b7b5627ae1230d53", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:17:00", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732645029", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "68", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "85", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "57545", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645017", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645017, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 19274, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE5pMVAADsGETCsERErL2CcLUtKAbvONt3i1uk8oVAYBAFCTAAAFgMBAQwBAAEIAwPFdKUDM1NkruWQErFHpKILy4R/eX2YEEZcMkq0VdrAASAXrwH0fEhZH3t/SIdOIon0SE6W4JEOOgF0Xl7YEDPDPwAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIATsPzUcx1z6PjaNAMHXjGONt2Z/SCpjcGo7ArDGfb1Z"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:57", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE5pMVAADsGETCsERErL2CcLUtKAbvONt3i1uk8oVAYBAFCTAAAFgMBAQwBAAEIAwPFdKUDM1NkruWQErFHpKILy4R/eX2YEEZcMkq0VdrAASAXrwH0fEhZH3t/SIdOIon0SE6W4JEOOgF0Xl7YEDPDPwAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIATsPzUcx1z6PjaNAMHXjGONt2Z/SCpjcGo7ArDGfb1Z", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.43", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "928bfe2f28ea05d4c3f222997cfe925d", "proto": "ssl", "xff": "", "alarm_id": "20241127_7b49d204432a5ebd3e7dc7f6691a8e9e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:57", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "19274", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645017", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645017, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58879, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsNAAHsGCjasEkLVeBvvAeX/AbtxTUBGwNJRkFAYAgMIuAAAFgMBAM0BAADJAwMlmwS2tLA2gi+B3NLW3VBRXES4eaWDrMO5Skh/ND8RrAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:57", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsNAAHsGCjasEkLVeBvvAeX/AbtxTUBGwNJRkFAYAgMIuAAAFgMBAM0BAADJAwMlmwS2tLA2gi+B3NLW3VBRXES4eaWDrMO5Skh/ND8RrAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.213", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9d5b193369226922c2ed140df2910ba", "proto": "ssl", "xff": "", "alarm_id": "20241127_d68e36c9c093808e1660b2a7bad3d1db", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:57", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58879", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645015", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645015, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64745, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6hnIAAHwG70msH38CeccjWfzpAbuXCBjesut8TlAYAEQuhAAAFgMBAM0BAADJAwNZakdSFncLnGPYyiw/+s1VTUFsA9LS8wkg5QujMCa/BAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:55", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6hnIAAHwG70msH38CeccjWfzpAbuXCBjesut8TlAYAEQuhAAAFgMBAM0BAADJAwNZakdSFncLnGPYyiw/+s1VTUFsA9LS8wkg5QujMCa/BAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:55", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64745", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645013", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732645013, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.249.9.246", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65335}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 02:16:53", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "123.249.9.246", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "9f27b6c49ef0d0a81f1d212360146d30", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644956", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.249.9.246", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY29tDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjo1MyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni4xNzY7ODM7"}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.176;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_65d841d4c67f6c30f01438df84a42891", "access_time": "2024-11-27 02:16:53", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "未知", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:53 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65335", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645009", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645009, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 49535, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6eTFAAHwG7emsE4OyeBvvAcF/AbtLDiRyCIVkzFAYBAG6UgAAFgMBAM0BAADJAwN+vJy66Lm7wF78l552jCu5BeT19t+d1p4mNaa1vW+QlAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:49", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6eTFAAHwG7emsE4OyeBvvAcF/AbtLDiRyCIVkzFAYBAG6UgAAFgMBAM0BAADJAwN+vJy66Lm7wF78l552jCu5BeT19t+d1p4mNaa1vW+QlAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.178", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "3ee27315417c85222dadb13e0622d797", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf189f31c7f0ed6dd0ffda7a9f5732d0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:49", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "49535", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645006", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645006, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.148", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51714, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAgDvyR1AAHsGLMGsEkKUL2LrH8oCAbtpnohCCWwX0VAYAgMnUgAAFgMBAMIBAAC+AwNSZe2pKitJEvI6fx4JMKW5GaX/4oN4H5rcLeeEeikcWwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:46", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAgDvyR1AAHsGLMGsEkKUL2LrH8oCAbtpnohCCWwX0VAYAgMnUgAAFgMBAMIBAAC+AwNSZe2pKitJEvI6fx4JMKW5GaX/4oN4H5rcLeeEeikcWwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.148", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "531bd5b25677317122b9bd6ba456d5d3", "proto": "ssl", "xff": "", "alarm_id": "20241127_ed94ff540084a4da8942e73afd1ff938", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:46", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.148", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51714", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645004", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645004, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 52518, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvMxlAAHsGp12sH2D2L2LoGs0mAbt7NPzmX0U/pVAYBAHYhQAAFgMBAMIBAAC+AwMeahIVJ+lA3+cOarhwep0A15BBuC7BZ+kmcVwqU0DEMgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:44", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvMxlAAHsGp12sH2D2L2LoGs0mAbt7NPzmX0U/pVAYBAHYhQAAFgMBAMIBAAC+AwMeahIVJ+lA3+cOarhwep0A15BBuC7BZ+kmcVwqU0DEMgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "483799dbf69f0565deaef38d58e1a89b", "proto": "ssl", "xff": "", "alarm_id": "20241127_f9044c346fdd793a6fc2c340d26b7f6e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:44", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "52518", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645003", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "114.114.114.114", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645003, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "114.114.114.114", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61706, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAA8KjAAAHsRI4esH2D2cnJycvEKADUAKD4LKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:43", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAA8KjAAAHsRI4esH2D2cnJycvEKADUAKD4LKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "483799dbf69f0565deaef38d58e1a89b", "proto": "dns", "xff": "", "alarm_id": "20241127_f9044c346fdd793a6fc2c340d26b7f6e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:43", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61706", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645003", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "8.8.8.8", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645003, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "8.8.8.8", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61706, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAA8RFkAAHsR3jKsH2D2CAgICPEKADUAKBLgKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:43", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAA8RFkAAHsR3jKsH2D2CAgICPEKADUAKBLgKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "483799dbf69f0565deaef38d58e1a89b", "proto": "dns", "xff": "", "alarm_id": "20241127_f9044c346fdd793a6fc2c340d26b7f6e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:43", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "美国", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61706", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645003", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "114.114.114.114", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645003, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "114.114.114.114", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61706, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8KjAAAH4RIIesH2D2cnJycvEKADUAKD4LKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:43", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8KjAAAH4RIIesH2D2cnJycvEKADUAKD4LKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8d70a01584085aef78b2d2592331e360", "proto": "dns", "xff": "", "alarm_id": "20241127_ffd94c5b3dfac732fe5d88ba531393ec", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:43", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61706", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645003", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645003, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 52518, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAADvMxlAAH4GpF2sH2D2L2LoGs0mAbt7NPzmX0U/pVAYBAHYhQAAFgMBAMIBAAC+AwMeahIVJ+lA3+cOarhwep0A15BBuC7BZ+kmcVwqU0DEMgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:43", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAADvMxlAAH4GpF2sH2D2L2LoGs0mAbt7NPzmX0U/pVAYBAHYhQAAFgMBAMIBAAC+AwMeahIVJ+lA3+cOarhwep0A15BBuC7BZ+kmcVwqU0DEMgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8d70a01584085aef78b2d2592331e360", "proto": "ssl", "xff": "", "alarm_id": "20241127_ffd94c5b3dfac732fe5d88ba531393ec", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:43", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "52518", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645003", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "8.8.8.8", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645003, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "8.8.8.8", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61706, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8RFkAAH4R2zKsH2D2CAgICPEKADUAKBLgKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:43", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8RFkAAH4R2zKsH2D2CAgICPEKADUAKBLgKN4BAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8d70a01584085aef78b2d2592331e360", "proto": "dns", "xff": "", "alarm_id": "20241127_ffd94c5b3dfac732fe5d88ba531393ec", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:43", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "美国", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61706", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645002", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "未分配资产组", "type": "弱口令", "_origin": {"write_date": 1732645002, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "121.37.225.23", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65333}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 02:16:42", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "局域网", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Web弱口令登录", "alarm_sip": "121.37.225.23", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "93f74bec9098fbd133c3183049b9229e", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732644983", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "121.37.225.23", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY24NCkNvbm5lY3Rpb246IGtlZXAtQWxpdmUNCg0K", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjoyMyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjc1LjE3Mjs4Mzs="}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.75.172;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_0e016640b6a29355a9915f59c4701d65", "access_time": "2024-11-27 02:16:42", "attack_addr": "局域网", "type_chain": "160E0000", "dip_addr": "中国--广东省--广州市", "rsp_status": "200", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:23 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65333", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645002", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645002, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.46.40", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59995, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD6w0hAAH4GwU2sHy4oeccjWepbAbtmIvgvgDOSlFAYBAEHnQAAFgMBAM0BAADJAwPMAMdBvTbj6oxEKYNGwtbyZeepNebfwxzhaf6lfuYR/QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:42", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAD6w0hAAH4GwU2sHy4oeccjWepbAbtmIvgvgDOSlFAYBAEHnQAAFgMBAM0BAADJAwPMAMdBvTbj6oxEKYNGwtbyZeepNebfwxzhaf6lfuYR/QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.46.40", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "1aec6a69ae8d740c98ce62cd3dbc47fe", "proto": "ssl", "xff": "", "alarm_id": "20241127_c03d8dbb4d6fc5f2bbc71c0b3edddc64", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:42", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.46.40", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59995", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645002", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732645002, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "121.37.225.23", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65333}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 02:16:42", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "121.37.225.23", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "8b818961b59bba088f2899b41b00b646", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644945", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "121.37.225.23", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY24NCkNvbm5lY3Rpb246IGtlZXAtQWxpdmUNCg0K", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjoyMyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjc1LjE3Mjs4Mzs="}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.75.172;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_78e340b36f8712d504a12b4ff521791c", "access_time": "2024-11-27 02:16:42", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--广东省--广州市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:23 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65333", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645002", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645002, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.46.40", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59995, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6w0hAAHsGxE2sHy4oeccjWepbAbtmIvgvgDOSlFAYBAEHnQAAFgMBAM0BAADJAwPMAMdBvTbj6oxEKYNGwtbyZeepNebfwxzhaf6lfuYR/QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:42", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6w0hAAHsGxE2sHy4oeccjWepbAbtmIvgvgDOSlFAYBAEHnQAAFgMBAM0BAADJAwPMAMdBvTbj6oxEKYNGwtbyZeepNebfwxzhaf6lfuYR/QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.46.40", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "b4ba651b93c091c36855a9d1e65989da", "proto": "ssl", "xff": "", "alarm_id": "20241127_4380524607ac5eb0fe598fabbd701be4", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:42", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.46.40", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59995", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732645000", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732645000, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33983, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4B5BAAD4GOB+sH1ABbxeRGYS/dTD6ekV/UZ4Pb4AYBbTr9AAAAQEICgzqQus/jupDbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZGIyM2E5M2ZjZmIzMTAxM2JkYmJmYmNlMDIxZmRhOTIiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5OTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:40", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4B5BAAD4GOB+sH1ABbxeRGYS/dTD6ekV/UZ4Pb4AYBbTr9AAAAQEICgzqQus/jupDbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZGIyM2E5M2ZjZmIzMTAxM2JkYmJmYmNlMDIxZmRhOTIiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5OTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:16:40", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33983", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644999", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网益阳供电公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644999, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.248.236", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 52612, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvb0NAAHsGLzOsEPjsL2KMM82EAbsPNdAXvZEmzVAYQHExcwAAFgMBAMIBAAC+AwO0ZzaJBUNGXm388rPHUh/Lhh72/2G6gYKBDdM/TS1g1wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvb0NAAHsGLzOsEPjsL2KMM82EAbsPNdAXvZEmzVAYQHExcwAAFgMBAMIBAAC+AwO0ZzaJBUNGXm388rPHUh/Lhh72/2G6gYKBDdM/TS1g1wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.248.236", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "f21adf36866303f93b4c9f9ccc904ada", "proto": "ssl", "xff": "", "alarm_id": "20241127_1cb8008ff1cdb2bfef90b51017e7c61a", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.248.236", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网益阳供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "52612", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644999", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644999, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.134", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64441, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAgDvdr9AAHsGfy2sEkKGL2LrH/u5AbvHGCzGV6GqvlAYAQH4NQAAFgMBAMIBAAC+AwMG9pLlXx5xa1iVBjUGME90qCdVUd/vrWro2kk5xP6dwgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAgDvdr9AAHsGfy2sEkKGL2LrH/u5AbvHGCzGV6GqvlAYAQH4NQAAFgMBAMIBAAC+AwMG9pLlXx5xa1iVBjUGME90qCdVUd/vrWro2kk5xP6dwgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.134", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "be376a46e5f8c3bc28e4b4f4b2711a5e", "proto": "ssl", "xff": "", "alarm_id": "20241127_13351240c6c4c5cbcd801d7165690f55", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.134", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64441", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644998", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644998, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.162.49", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 9504, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvXmdAAHoGO+KsEaIxL2LoGiUgAbvim2QqTBqNx1AYQHFayAAAFgMBAMIBAAC+AwMTrLCE1j1Vv0Rhm7WNnryfLHq42qLiz2obPz38qvBQ2QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:38", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvXmdAAHoGO+KsEaIxL2LoGiUgAbvim2QqTBqNx1AYQHFayAAAFgMBAMIBAAC+AwMTrLCE1j1Vv0Rhm7WNnryfLHq42qLiz2obPz38qvBQ2QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.162.49", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "1d24ceefbc95c1ad5b876b750f8f3301", "proto": "ssl", "xff": "", "alarm_id": "20241127_d01ed90486f99ea74a2d84af739668b0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:38", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.162.49", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "9504", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644998", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网郴州供电公司", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644998, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.195.149", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64855, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvyeZAADwGOB6sEcOVL2Oc+v1XAbtWz/hsxFMGw1AYBAGy8wAAFgMBAMIBAAC+AwPW0Gtj9yVTkbETGYUtnr20ZbgVkSDT1geME5KZS1rFYwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:38", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvyeZAADwGOB6sEcOVL2Oc+v1XAbtWz/hsxFMGw1AYBAGy8wAAFgMBAMIBAAC+AwPW0Gtj9yVTkbETGYUtnr20ZbgVkSDT1geME5KZS1rFYwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.195.149", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "bec9f0639e800fe66298c98fb4225223", "proto": "ssl", "xff": "", "alarm_id": "20241127_30ddd0930a1c2b1fae9f81972acffe87", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:38", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.195.149", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网郴州供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64855", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644997", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644997, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.89.36", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51078, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6G5BAAHwGdhmsE1kkeBvvAceGAbuea1BxdczE8VAYAP9SVgAAFgMBAM0BAADJAwMpeATgGKzMArOK477vJ/juYDvSIsYC5yzgsP/NsJPfEwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:37", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6G5BAAHwGdhmsE1kkeBvvAceGAbuea1BxdczE8VAYAP9SVgAAFgMBAM0BAADJAwMpeATgGKzMArOK477vJ/juYDvSIsYC5yzgsP/NsJPfEwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.89.36", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "500c5c29cf76b9d78cfa784c9c9cf3ad", "proto": "ssl", "xff": "", "alarm_id": "20241127_9dc6004f440e93c24dcbe554a6e059be", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:37", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.89.36", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51078", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644992", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644992, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 50435, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv/d5AAHwGt3GsE+EPL2KMM8UDAbsEauxufYzQ6VAYBAHcxQAAFgMBAMIBAAC+AwMp0xbJSToGsJtvciMwyaSra8HnNrOkGnTR2R8SkTqffQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:32", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv/d5AAHwGt3GsE+EPL2KMM8UDAbsEauxufYzQ6VAYBAHcxQAAFgMBAMIBAAC+AwMp0xbJSToGsJtvciMwyaSra8HnNrOkGnTR2R8SkTqffQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.225.15", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "afa7f0d50d4b810ec04daadb58570ba5", "proto": "ssl", "xff": "", "alarm_id": "20241127_c4d2d8ac5125f291cfde4357a193c178", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:32", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644960", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "50435", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644991", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644991, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 57573, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAHPAjZAADsGEc+sH2IFdh+l4ODlAbucKNOuUccUB1AYQHG2RQAAFgMBAaIBAAGeAwNnRhCDOj+KjEdAYJgEz78fJJHXWK1n3jdPKi3EI5/AIwABGgD/wCzAMACfwK3An8AkwCgAa8AKwBQAOcCvwKPAh8CLwH3Ac8B3AMQAiMArwC8AnsCswJ7AI8AnAGfACcATADPArsCiwIbAisB8wHLAdgC+AEXACMASABYAq8CnwDgAs8A2AJHAkcCbwJfAqwCqwKbANwCywDUAkMCQwJbAmsCqwDQAjwCdwJ0APQA1wDLAKsAPwC7AJsAFwKHAewDAAITAjcB5wInAdQCcwJwAPAAvwDHAKcAOwC3AJcAEwKDAegC6AEHAjMB4wIjAdAAKwA3AAwCtALcAlcCTwJkArAC2AJTAksCYAJMAqcClAK8AjcCPwJXAqQCowKQArgCMwI7AlMCoAIvAB8ARwDMAjgAFAATADMACAJIAigEAAFsAAAATABEAAA5zbGFwaS5vcmF5Lm5ldAANABoAGAYBBQEEAQMBAgEBAQYDBQMEAwMDAgMBAwAKABgAFgAZABwAGAAbABcAFgAaABUAFAATABIACwACAQAAIwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:31", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "19dddc47ab405e6e450facfaf97ac562", "proto": "ssl", "xff": "", "alarm_id": "20241127_386981aec1411ea54a4f50e4624a555c", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:31", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "57573", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644991", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644991, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 57573, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:31", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAHPAjZAAD4GDs+sH2IFdh+l4ODlAbucKNOuUccUB1AYQHG2RQAAFgMBAaIBAAGeAwNnRhCDOj+KjEdAYJgEz78fJJHXWK1n3jdPKi3EI5/AIwABGgD/wCzAMACfwK3An8AkwCgAa8AKwBQAOcCvwKPAh8CLwH3Ac8B3AMQAiMArwC8AnsCswJ7AI8AnAGfACcATADPArsCiwIbAisB8wHLAdgC+AEXACMASABYAq8CnwDgAs8A2AJHAkcCbwJfAqwCqwKbANwCywDUAkMCQwJbAmsCqwDQAjwCdwJ0APQA1wDLAKsAPwC7AJsAFwKHAewDAAITAjcB5wInAdQCcwJwAPAAvwDHAKcAOwC3AJcAEwKDAegC6AEHAjMB4wIjAdAAKwA3AAwCtALcAlcCTwJkArAC2AJTAksCYAJMAqcClAK8AjcCPwJXAqQCowKQArgCMwI7AlMCoAIvAB8ARwDMAjgAFAATADMACAJIAigEAAFsAAAATABEAAA5zbGFwaS5vcmF5Lm5ldAANABoAGAYBBQEEAQMBAgEBAQYDBQMEAwMDAgMBAwAKABgAFgAZABwAGAAbABcAFgAaABUAFAATABIACwACAQAAIwAA", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9920e327d0946f3e29939bbb2705084", "proto": "ssl", "xff": "", "alarm_id": "20241127_d06efc8691f278ccc16c667c8712da50", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:31", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "57573", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644991", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644991, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51495, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8AjMAAD4R33OsH2IFrB/gxsknADUAKGaAfzsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:31", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8AjMAAD4R33OsH2IFrB/gxsknADUAKGaAfzsBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9920e327d0946f3e29939bbb2705084", "proto": "dns", "xff": "", "alarm_id": "20241127_d06efc8691f278ccc16c667c8712da50", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:31", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644999", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51495", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644987", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644987, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.143", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64819, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvP/RAADwGsnKsE4OPdh+l4P0zAbsL9kXKoO0jrlAYBAE4QAAAFgMBAMIBAAC+AwPHIfZhkMTDnf1tAIGC2o5kb582tdsnK70jJx6Mkvtx2QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:27", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvP/RAADwGsnKsE4OPdh+l4P0zAbsL9kXKoO0jrlAYBAE4QAAAFgMBAMIBAAC+AwPHIfZhkMTDnf1tAIGC2o5kb582tdsnK70jJx6Mkvtx2QAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.143", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8126884080d9bcfa172930c019606aca", "proto": "ssl", "xff": "", "alarm_id": "20241127_c3e43f612ed5f5f4d18b5153c434ae38", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:27", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.143", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64819", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644986", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644986, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 49532, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6eS5AAHwG7eysE4OyeBvvAcF8AbsZGCs8/ZJtRFAYBAHQwgAAFgMBAM0BAADJAwPrXf0SCSjCOf6wlMySSkiAVGg9IDpyA2AMwx8Spbqb6gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:26", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6eS5AAHwG7eysE4OyeBvvAcF8AbsZGCs8/ZJtRFAYBAHQwgAAFgMBAM0BAADJAwPrXf0SCSjCOf6wlMySSkiAVGg9IDpyA2AMwx8Spbqb6gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.178", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "3ee27315417c85222dadb13e0622d797", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf189f31c7f0ed6dd0ffda7a9f5732d0", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:26", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "49532", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644982", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644982, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.161.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62823, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvalVAAHwGKp6sE6ECdh+l4PVnAbtydeCpEYZMhVAYAQGCfwAAFgMBAMIBAAC+AwNE1tym6vjj8LUzTVKjBHjwCml5eqQSnFLENun9DsDPvgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:22", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvalVAAHwGKp6sE6ECdh+l4PVnAbtydeCpEYZMhVAYAQGCfwAAFgMBAMIBAAC+AwNE1tym6vjj8LUzTVKjBHjwCml5eqQSnFLENun9DsDPvgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.161.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "01bcfe71a631f1d7315947aa1255bc03", "proto": "ssl", "xff": "", "alarm_id": "20241127_08a209378198dd83433db782b3890895", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:22", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.161.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62823", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644981", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644981, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 6374, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6E2FAADwGGgisE5j0L2CcLRjmAbvbRFqNWYwkcVAYAgPx5gAAFgMBAM0BAADJAwNgvzIIpHQoXdyzC4CL7nNgpJ3lh8TwV2NZfg1HRaXe+gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:21", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6E2FAADwGGgisE5j0L2CcLRjmAbvbRFqNWYwkcVAYAgPx5gAAFgMBAM0BAADJAwNgvzIIpHQoXdyzC4CL7nNgpJ3lh8TwV2NZfg1HRaXe+gAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.152.244", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "42439089e6036890825644d25e52c48a", "proto": "ssl", "xff": "", "alarm_id": "20241127_7882c0937d8c94c2b577a53837454bf3", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:21", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "6374", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644979", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644979, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.22", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58493, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE54BdAAHsGxF+sEREWeccjWeR9AbsqBbBDPX2wBlAYAgNW3AAAFgMBAQwBAAEIAwPNE1yOQJg6pUuXUGMM+XUqG6W0X2e4IHC3cCtG6LUVhCCRu88sucEL2zpaQ9GMCcc18bhSNcuLEMiIiOgS56SqbAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AINWp3uFttdXfnF+jE6lyWz8lF23PXI9REw+VqYSDJfMF"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:19", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE54BdAAHsGxF+sEREWeccjWeR9AbsqBbBDPX2wBlAYAgNW3AAAFgMBAQwBAAEIAwPNE1yOQJg6pUuXUGMM+XUqG6W0X2e4IHC3cCtG6LUVhCCRu88sucEL2zpaQ9GMCcc18bhSNcuLEMiIiOgS56SqbAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AINWp3uFttdXfnF+jE6lyWz8lF23PXI9REw+VqYSDJfMF", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.22", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "afdd395dca7e1086eab8f0d5794f167f", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf73c6d2e940702824d17fb7f9d74ff5", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:19", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.22", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58493", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644979", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644979, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58878, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsBAAHsGCjmsEkLVeBvvAeX+Abs6s4gY0k/nC1AYAgMmRAAAFgMBAM0BAADJAwNV7Zq4CILISTdXke9xctjaEXP2HOyinGEKWqRCyTJeggAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:19", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6nsBAAHsGCjmsEkLVeBvvAeX+Abs6s4gY0k/nC1AYAgMmRAAAFgMBAM0BAADJAwNV7Zq4CILISTdXke9xctjaEXP2HOyinGEKWqRCyTJeggAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.213", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9d5b193369226922c2ed140df2910ba", "proto": "ssl", "xff": "", "alarm_id": "20241127_d68e36c9c093808e1660b2a7bad3d1db", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:19", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58878", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644979", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644979, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62466, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6TWwAAHwGKFCsH38CeccjWfQCAbsSESS7Q3FEu1AYETCq6AAAFgMBAM0BAADJAwPo2U69wIE4ifmHMd5qwdvsWJjlJc6CuvRRyxjXMA9S9wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:19", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6TWwAAHwGKFCsH38CeccjWfQCAbsSESS7Q3FEu1AYETCq6AAAFgMBAM0BAADJAwPo2U69wIE4ifmHMd5qwdvsWJjlJc6CuvRRyxjXMA9S9wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:19", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62466", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644976", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644976, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.67.86", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 53401, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvXTJAAHsG5hKsEENWL2Oc+tCZAbvqEkvWhBt/k1AYQHH7vgAAFgMBAMIBAAC+AwPyOkOSe9ZJgIVc4t6Dpr6R9Ly9iO+rvvyigKN7cHqlcgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:16", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvXTJAAHsG5hKsEENWL2Oc+tCZAbvqEkvWhBt/k1AYQHH7vgAAFgMBAMIBAAC+AwPyOkOSe9ZJgIVc4t6Dpr6R9Ly9iO+rvvyigKN7cHqlcgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.67.86", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "30a7a67256e6acead2bd19a7cd04e68d", "proto": "ssl", "xff": "", "alarm_id": "20241127_a956d34912d0431d91709a50b83cc1e1", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:16", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.67.86", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "53401", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644971", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644971, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58873, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6/+JAAHsGRKasEkLVL2CcLeX5AbuQgqmy1Lqt61AYAgPAygAAFgMBAM0BAADJAwPLGyCrgLIkHm4HgVrYmNahBJ3zVvyBumk4Ilj32zxLQgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:11", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6/+JAAHsGRKasEkLVL2CcLeX5AbuQgqmy1Lqt61AYAgPAygAAFgMBAM0BAADJAwPLGyCrgLIkHm4HgVrYmNahBJ3zVvyBumk4Ilj32zxLQgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.213", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "d9d5b193369226922c2ed140df2910ba", "proto": "ssl", "xff": "", "alarm_id": "20241127_d68e36c9c093808e1660b2a7bad3d1db", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:11", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.213", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58873", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644967", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644967, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.64.7", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 55147, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvdztAAHwGgzasE0AHL2LoGtdrAbucyV8kqCp7ulAYAgMpOgAAFgMBAMIBAAC+AwMQieHtSGeahETd9MYNY4PlHhxD9uFMZlssCp/D4X599AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:07", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvdztAAHwGgzasE0AHL2LoGtdrAbucyV8kqCp7ulAYAgMpOgAAFgMBAMIBAAC+AwMQieHtSGeahETd9MYNY4PlHhxD9uFMZlssCp/D4X599AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.64.7", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "66d44324e672f44b56b9a8dc363cd579", "proto": "ssl", "xff": "", "alarm_id": "20241127_333a9bc235d7a2d611c91edd2cc024fb", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:07", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.64.7", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "55147", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644965", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644965, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.137.36", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 55777, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6C1lAADwGMeCsE4kkL2CcLdnhAbvS2SXl56blXlAYAgOJZAAAFgMBAM0BAADJAwOC1UA0DfTspdm+FSOV6q+KcX+gPDoLv0NF3EPEPVUWpQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:05", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6C1lAADwGMeCsE4kkL2CcLdnhAbvS2SXl56blXlAYAgOJZAAAFgMBAM0BAADJAwOC1UA0DfTspdm+FSOV6q+KcX+gPDoLv0NF3EPEPVUWpQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.137.36", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a9e2f4a363ab642004938d63719f2531", "proto": "ssl", "xff": "", "alarm_id": "20241127_28aebe519c0ba88c41f6ca8ae97659d8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:16:05", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644931", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.137.36", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "55777", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644962", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732644962, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.249.9.246", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65324}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 02:16:02", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "123.249.9.246", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "9f27b6c49ef0d0a81f1d212360146d30", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644903", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.249.9.246", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY24NCkNvbm5lY3Rpb246IGtlZXAtQWxpdmUNCg0K", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjowMiBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjczLjI0Nzs4Mzs="}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.73.247;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_65d841d4c67f6c30f01438df84a42891", "access_time": "2024-11-27 02:16:02", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "未知", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:02 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65324", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644962", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "未分配资产组", "type": "弱口令", "_origin": {"write_date": 1732644962, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.249.9.246", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65324}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 02:16:02", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "局域网", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Web弱口令登录", "alarm_sip": "123.249.9.246", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "879cf3386472304f4c2eeb58411e78ad", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732644942", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.249.9.246", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY24NCkNvbm5lY3Rpb246IGtlZXAtQWxpdmUNCg0K", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNjowMiBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjczLjI0Nzs4Mzs="}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.73.247;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_9f0fcca7fe60b08a782d75f922ee126d", "access_time": "2024-11-27 02:16:02", "attack_addr": "局域网", "type_chain": "160E0000", "dip_addr": "未知", "rsp_status": "200", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:16:02 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65324", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644960", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644960, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 194, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 174, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33979, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "174", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4hvRAAD4GuLqsH1ABbxeRGYS7dTDVBLXNwU6OGoAYBbSwTAAAAQEICgzqM0c/jtqdbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiOGFhZTQzM2QyMWY0Y2E1MWFkMjI0YjcyM2U0ZDUxODMiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5NTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:16:00", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4hvRAAD4GuLqsH1ABbxeRGYS7dTDVBLXNwU6OGoAYBbSwTAAAAQEICgzqM0c/jtqdbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiOGFhZTQzM2QyMWY0Y2E1MWFkMjI0YjcyM2U0ZDUxODMiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5NTIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:16:00", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644969", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "194", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33979", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644952", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732644952, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "120.76.40.171", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65312}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 02:15:52", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "120.76.40.171", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "1d12dd1e7c195b6f4b73dd444fc332c9", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644895", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "120.76.40.171", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY29tDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNTo1MiBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni4xOTE7ODM7"}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.191;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_80ade8e70232dce763d1f32fe97ae828", "access_time": "2024-11-27 02:15:52", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--广东省--深圳市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:15:52 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65312", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644950", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网益阳供电公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644950, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62764, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvQdVAAHoGUIKsEaojL2LoGvUsAbtPb6f5FdwdC1AYAgODXQAAFgMBAMIBAAC+AwMMkv3z5t1X1/9bOSXiIqyB43vI0nqLRdwmYK3L8220rQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:50", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvQdVAAHoGUIKsEaojL2LoGvUsAbtPb6f5FdwdC1AYAgODXQAAFgMBAMIBAAC+AwMMkv3z5t1X1/9bOSXiIqyB43vI0nqLRdwmYK3L8220rQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.170.35", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "6138f40c715cefd905252ce0c895d066", "proto": "ssl", "xff": "", "alarm_id": "20241127_bce1ecd59f244780b0f539ad8c5c3162", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:15:50", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644901", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网益阳供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62764", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644950", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "222.246.129.80", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644950, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "222.246.129.80", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 85, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58268, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "AJShXm6HACSs3Z37CABFAABHd38AAHoR2/msH+DG3vaBUOOcADUAM/pTtSkBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:50", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "AJShXm6HACSs3Z37CABFAABHd38AAHoR2/msH+DG3vaBUOOcADUAM/pTtSkBAAABAAAAAAABBXNsYXBpBG9yYXkDbmV0AAABAAEAACkPoAAAgAAAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.224.198", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "4e2651baadd40a1e467f7883a47fcea8", "proto": "dns", "xff": "", "alarm_id": "20241127_de9a08f2acf9a270b7b5627ae1230d53", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:15:50", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644939", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.224.198", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "85", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58268", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644944", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644944, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 19253, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE54z9AADsGNyasEREreBvvAUs1AbtlXHZyMAFXYFAYBAHOuAAAFgMBAQwBAAEIAwNBGu7Wx20wiPAsIYyw+QwHQZsTT9RzzxflUgAanhw0+CAhxVzIHHitTktvkJMYwy2SAmE7MB6EUAtX0cG1AZW/VQAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIOK7s/S0jbMX7aCORrvs6y1BXLJfdfh4+TKAJRY5twQo"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:44", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE54z9AADsGNyasEREreBvvAUs1AbtlXHZyMAFXYFAYBAHOuAAAFgMBAQwBAAEIAwNBGu7Wx20wiPAsIYyw+QwHQZsTT9RzzxflUgAanhw0+CAhxVzIHHitTktvkJMYwy2SAmE7MB6EUAtX0cG1AZW/VQAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIOK7s/S0jbMX7aCORrvs6y1BXLJfdfh4+TKAJRY5twQo", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.43", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "928bfe2f28ea05d4c3f222997cfe925d", "proto": "ssl", "xff": "", "alarm_id": "20241127_7b49d204432a5ebd3e7dc7f6691a8e9e", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:15:44", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732644901", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "19253", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644942", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732644942, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.60.84.3", "site_app": "通用", "hit_end": 102, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 82, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.17.50.167", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 65301}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 02:15:42", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "123.60.84.3", "passwd": "617934985", "skyeye_index": "", "sip_ioc_dip": "f1c6ec61627fd92fca0223dd8d1a1f0e", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "617934985", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732644883", "code_language": "通用", "vendor": "jinrunkefu", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "102", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.17.50.167", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.60.84.3", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "82", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT02MTc5MzQ5ODUmcGFzc3dkPTYxNzkzNDk4NSZ2ZW5kb3I9amlucnVua2VmdSBIVFRQLzEuMQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtQ04NCkhvc3Q6IGdubGFuaW5kZXguZ253YXkuY29tDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxODoxNTo0MiBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjc1LjE3Mjs4Mzs="}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.75.172;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_6c85e14664fd2ecdf99584c2f374a87b", "access_time": "2024-11-27 02:15:42", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--香港特别行政区--中国香港", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.50.167", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 18:15:42 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"617934985\", \"password\": \"617934985\"}}", "sport": "65301", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=617934985&passwd=617934985&vendor=jinrunkefu"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644940", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644940, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 33977, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4E7pAAD4GK/WsH1ABbxeRGYS5dTDCazjd9lwqYIAYBbRFiAAAAQEICgzqK3Q/jtLLbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiOTA3MTkwMGUxYzVjYTEzMWNkNjRlMzNiODZlNWUzN2MiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5MzIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:40", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4E7pAAD4GK/WsH1ABbxeRGYS5dTDCazjd9lwqYIAYBbRFiAAAAQEICgzqK3Q/jtLLbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiOTA3MTkwMGUxYzVjYTEzMWNkNjRlMzNiODZlNWUzN2MiLCJ0aW1lc3RhbXAiOjE3MzI2NDQ5MzIsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 02:15:40", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644939", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "33977", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644939", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644939, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59783, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "ssl", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:15:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644939", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59783", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。
|
{"write_date": "1732644939", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732644939, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 56722, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8HKcAAD4R5MqsH0I6rB/gxt2SADUAKMWKK5EBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 02:15:39", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8HKcAAD4R5MqsH0I6rB/gxt2SADUAKMWKK5EBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "dns", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 02:15:39", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732644939", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "56722", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}
|
误报
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.