First event: @@STARTTIME@@
+ Last event: @@ENDTIME@@
Brought to you by + @@VERSION@@
+ + diff --git a/roles/epylog/files/merged/trojans.list b/roles/epylog/files/merged/trojans.list new file mode 100644 index 0000000000..09b795b4c3 --- /dev/null +++ b/roles/epylog/files/merged/trojans.list @@ -0,0 +1,410 @@ +1/udp Sockets des Troie +2/tcp Death +30/tcp Agent 40421 +31/tcp Agent 31 +41/tcp Deep Throat +48/tcp DRAT +58/tcp DMSetup +59/tcp DMSetup +79/tcp CDK +81/tcp RemoConChubo +99/tcp Hidden Port +121/tcp Attack Bot +133/tcp Farnaz +142/tcp NetTaxi +146/tcp Infector +146/udp Infector +170/tcp A-trojan +334/tcp Backage +411/tcp Backage +420/tcp Breach +421/tcp TCP Wrappers trojan +455/tcp Fatal Connections +456/tcp Hackers Paradise +513/tcp Grlogin +514/tcp RPC Backdoor +531/tcp Net666, Rasmin +555/tcp Seven-Eleven +605/tcp Secret Service +666/tcp The Ripperz +667/tcp SniperNet +669/tcp DP trojan +692/tcp GayOL +777/tcp AimSpy +808/tcp WinHole +911/tcp Dark Shadow +999/tcp Deep Throat +1000/tcp Der Spaeher +1001/tcp Der Spaeher +1010/tcp Doly Trojan +1011/tcp Doly Trojan +1012/tcp Doly Trojan +1015/tcp Doly Trojan +1016/tcp Doly Trojan +1020/tcp Vampire +1024/tcp NetSpy +1025/tcp Remote Storm +1025/udp Remote Storm +1035/tcp Multidropper +1042/tcp BLA trojan +1045/tcp Rasmin +1049/tcp /sbin/initd +1050/tcp MiniCommand +1053/tcp The Thief +1054/tcp AckCmd +1080/tcp WinHole +1081/tcp WinHole +1082/tcp WinHole +1083/tcp WinHole +1090/tcp Xtreme +1095/tcp RAT +1097/tcp RAT +1098/tcp RAT +1099/tcp RAT +1150/tcp Orion +1151/tcp Orion +1170/tcp PSS +1200/udp NoBackO +1201/udp NoBackO +1207/tcp SoftWAR +1208/tcp Infector +1212/tcp Kaos +1234/tcp SubSeven +1243/tcp BackDoor-G +1245/tcp VooDoo Doll +1255/tcp Scarab +1256/tcp Project nEXT +1269/tcp Matrix +1272/tcp The Matrix +1313/tcp NETrojan +1338/tcp Millenium Worm +1349/tcp Bo dll +1394/tcp GoFriller +1441/tcp Remote Storm +1492/tcp FTP99CMP +1524/tcp Trinoo +1568/tcp Remote Hack +1600/tcp Shivka-Burka +1703/tcp Exploiter +1777/tcp Scarab +1807/tcp SpySender +1966/tcp Fake FTP +1967/tcp WM FTP Server +1969/tcp OpC BO +1981/tcp Bowl, Shockrave +1999/tcp SubSeven +2000/tcp Der Spaeher +2001/tcp Der Späher +2023/tcp Ripper Pro +2080/tcp WinHole +2115/tcp Bugs +2130/udp Mini Backlash +2140/tcp The Invasor +2140/udp Deep Throat +2155/tcp Illusion Mailer +2255/tcp Nirvana +2283/tcp Hvl RAT +2300/tcp Xplorer +2311/tcp Studio 54 +2330/tcp Contact +2331/tcp Contact +2332/tcp Contact +2333/tcp Contact +2334/tcp Contact +2335/tcp Contact +2336/tcp Contact +2337/tcp Contact +2338/tcp Contact +2339/tcp Contact +2339/udp Voice Spy +2345/tcp Doly Trojan +2565/tcp Striker trojan +2583/tcp WinCrash +2600/tcp Digital RootBeer +2716/tcp The Prayer +2773/tcp SubSeven +2774/tcp SubSeven +2801/tcp Phineas Phucker +2989/udp RAT +3000/tcp Remote Shut +3024/tcp WinCrash +3031/tcp Microspy +3128/tcp Ringzero +3129/tcp Masters Paradise +3150/tcp The Invasor +3150/udp Deep Throat +3456/tcp Terror trojan +3459/tcp Eclipse 2000 +3700/tcp Portal of Doom +3777/tcp PsychWard +3791/tcp Total Solar Eclypse +3801/tcp Total Solar Eclypse +4000/tcp SkyDance +4092/tcp WinCrash +4242/tcp VHM +4321/tcp BoBo +4444/tcp Prosiak +4567/tcp File Nail +4590/tcp ICQ Trojan +4950/tcp ICQ Trogen (Lm) +5000/tcp Back Door Setup +5001/tcp Back Door Setup +5002/tcp cd00r +5010/tcp Solo +5011/tcp OOTLT +5025/tcp WM Remote KeyLogger +5031/tcp Net Metropolitan +5032/tcp Net Metropolitan +5321/tcp Firehotcker +5333/tcp Backage +5343/tcp wCrat +5400/tcp Back Construction +5401/tcp Back Construction +5402/tcp Back Construction +5512/tcp Illusion Mailer +5534/tcp The Flu +5550/tcp Xtcp +5555/tcp ServeMe +5556/tcp BO Facil +5557/tcp BO Facil +5569/tcp Robo-Hack +5637/tcp PC Crasher +5638/tcp PC Crasher +5742/tcp WinCrash +5760/tcp Portmap Remote Root Linux Exploit +5880/tcp Y3K RAT +5882/tcp Y3K RAT +5882/udp Y3K RAT +5888/tcp Y3K RAT +5888/udp Y3K RAT +5889/tcp Y3K RAT +6000/tcp The Thing +6006/tcp Bad Blood +6272/tcp Secret Service +6400/tcp The Thing +6661/tcp TEMan +6666/tcp Dark Connection Inside +6667/tcp Dark FTP +6669/tcp Host Control, Vampire +6670/tcp BackWeb Server +6711/tcp BackDoor-G +6712/tcp Funny trojan +6713/tcp SubSeven +6723/tcp Mstream +6771/tcp Deep Throat +6776/tcp 2000 Cracks +6838/udp Mstream +6883/tcp Delta Source DarkStar (??) +6912/tcp Shit Heep +6939/tcp Indoctrination +6969/tcp GateCrasher +6970/tcp GateCrasher +7000/tcp Exploit Translation Server +7001/tcp Freak88 +7215/tcp SubSeven +7300/tcp NetMonitor +7301/tcp NetMonitor +7306/tcp NetMonitor +7307/tcp NetMonitor +7308/tcp NetMonitor +7424/tcp Host Control +7424/udp Host Control +7597/tcp Qaz +7626/tcp Glacier +7777/tcp God Message, Tini +7789/tcp Back Door Setup, ICKiller +7891/tcp The ReVeNgEr +7983/tcp Mstream +8080/tcp Brown Orifice +8787/tcp Back Orifice 2000 +8988/tcp BacHack +8989/tcp Rcon +9000/tcp Netministrator +9325/udp Mstream +9400/tcp InCommand +9872/tcp Portal of Doom +9873/tcp Portal of Doom +9874/tcp Portal of Doom +9875/tcp Portal of Doom +9876/tcp Cyber Attacker, Rux +9878/tcp TransScout +9989/tcp Ini-Killer +9999/tcp The Prayer +10000/tcp OpwinTRojan +10005/tcp OpwinTRojan +10067/udp Portal of Doom +10085/tcp Syphillis +10086/tcp Syphillis +10100/tcp Control Total +10101/tcp BrainSpy +10167/udp Portal of Doom +10520/tcp Acid Shivers +10528/tcp Host Control +10607/tcp Coma +10666/udp Ambush +11000/tcp Senna Spy Trojan Generator +11050/tcp Host Control +11051/tcp Host Control +11223/tcp Progenic trojan +12076/tcp Gjamer +12223/tcp Hack-99 KeyLogger +12345/tcp Ashley +12346/tcp Fat Bitch +12349/tcp BioNet +12361/tcp Whack-a-mole +12362/tcp Whack-a-mole +12363/tcp Whack-a-mole +12623/udp DUN Control +12624/tcp ButtMan +12631/tcp Whack Job +12754/tcp Mstream +13000/tcp Senna Spy +13010/tcp Hacker Brasil - HBR +13013/tcp PsychWard +13014/tcp PsychWard +13223/tcp Hack´99 KeyLogger +13473/tcp Chupacabra +14500/tcp PC Invader +14501/tcp PC Invader +14502/tcp PC Invader +14503/tcp PC Invader +15000/tcp NetDemon +15092/tcp Host Control +15104/tcp Mstream +15382/tcp SubZero +15858/tcp CDK +16484/tcp Mosucker +16660/tcp Stacheldraht +16772/tcp ICQ Revenge +16959/tcp SubSeven +16969/tcp Priority +17166/tcp Mosaic +17300/tcp Kuang2 the virus +17449/tcp Kid Terror +17499/tcp CrazzyNet +17500/tcp CrazzyNet +17569/tcp Infector +17593/tcp Audiodoor +17777/tcp Nephron +18753/udp Shaft +19864/tcp ICQ Revenge +20000/tcp Millenium +20001/tcp Millenium +20002/tcp AcidkoR +20005/tcp Mosucker +20023/tcp VP Killer +20034/tcp NetBus +20203/tcp Chupacabra +20331/tcp BLA trojan +20432/tcp Shaft +20433/udp Shaft +21544/tcp GirlFriend, Kid Terror +21554/tcp Exploiter +22222/tcp Donald Dick +23005/tcp NetTrash +23006/tcp NetTrash +23023/tcp Logged +23032/tcp Amanda +23432/tcp Asylum +23456/tcp Evil FTP +23476/tcp Donald Dick +23476/udp Donald Dick +23477/tcp Donald Dick +23777/tcp InetSpy +24000/tcp Infector +25685/tcp Moonpie +25686/tcp Moonpie +25982/tcp Moonpie +26274/udp Delta Source +26681/tcp Voice Spy +27374/tcp Bad Blood +27444/udp Trinoo +27573/tcp SubSeven +27665/tcp Trinoo +28678/tcp Exploiter +29104/tcp NetTrojan +29369/tcp ovasOn +29891/tcp The Unexplained +30000/tcp Infector +30001/tcp ErrOr32 +30003/tcp Lamers Death +30029/tcp AOL trojan +30100/tcp NetSphere +30101/tcp NetSphere +30102/tcp NetSphere +30103/tcp NetSphere +30103/udp NetSphere +30133/tcp NetSphere +30303/tcp Sockets des Troie +30947/tcp Intruse +30999/tcp Kuang2 +31335/tcp Trinoo +31336/tcp Bo Whack, Butt Funnel +31337/tcp Back Fire +31337/udp Back Orifice +31338/tcp Back Orifice +31338/udp Deep BO +31339/tcp NetSpy (DK) +31666/tcp BOWhack +31785/tcp Hack´a´Tack +31787/tcp Hack´a´Tack +31788/tcp Hack´a´Tack +31789/udp Hack´a´Tack +31790/tcp Hack´a´Tack +31791/udp Hack´a´Tack +31792/tcp Hack´a´Tack +32001/tcp Donald Dick +32100/tcp Peanut Brittle +32418/tcp Acid Battery +33270/tcp Trinity +33333/tcp Blakharaz +33577/tcp Son of PsychWard +33777/tcp Son of PsychWard +33911/tcp Spirit 2000 +34324/tcp Big Gluck +34444/tcp Donald Dick +34555/udp Trinoo +35555/udp Trinoo +37237/tcp Mantis +37651/tcp Yet Another Trojan - YAT +40412/tcp The Spy +40421/tcp Agent 40421 +40422/tcp Masters Paradise +40423/tcp Masters Paradise +40425/tcp Masters Paradise +40426/tcp Masters Paradise +41337/tcp Storm +41666/tcp RBT +44444/tcp Prosiak +44575/tcp Exploiter +47262/udp Delta Source +49301/tcp OnLine KeyLogger +50130/tcp Enterprise +50505/tcp Sockets des Troie +50766/tcp Fore +51966/tcp Cafeini +52317/tcp Acid Battery 2000 +53001/tcp RWS +54283/tcp SubSeven +54320/tcp Back Orifice 2000 +54321/tcp Back Orifice 2000 +55165/tcp File Manager trojan +55166/tcp WM Trojan Generator +57341/tcp NetRaider +58339/tcp Butt Funnel +60000/tcp Deep Throat +60001/tcp Trinity +60068/tcp Xzip 6000068 +60411/tcp Connection +61348/tcp Bunker-Hill +61466/tcp TeleCommando +61603/tcp Bunker-Hill +63485/tcp Bunker-Hill +64101/tcp Taskman +65000/tcp Devil +65390/tcp Eclypse +65421/tcp Jade +65432/tcp The Traitor (= th3tr41t0r) +65432/udp The Traitor (= th3tr41t0r) +65534/tcp /sbin/initd +65535/tcp RC1 trojan diff --git a/roles/epylog/files/merged/weed_dist.cf b/roles/epylog/files/merged/weed_dist.cf new file mode 100644 index 0000000000..dd87e2d351 --- /dev/null +++ b/roles/epylog/files/merged/weed_dist.cf @@ -0,0 +1,179 @@ +## +# NOTE: +# Editing this file is not recommended. If you do, you might miss newer +# revisions of this list in the future versions. +# See weed_local.cf for instructions on how to add or delete rules. +# + +[pam] +\(pam_unix\).*: session closed for +\(pam_unix\).*: check pass; + +[dhcpd] +dhcpd: DHCPREQUEST +dhcpd: DHCPACK +dhcpd: DHCPDISCOVER +dhcpd: DHCPOFFER +dhcpd: DHCPRELEASE +dhcpd: DHCPINFORM + +[rpc] +rpc.mountd: authenticated mount request from +rpc.mountd: authenticated unmount request +rpc.statd.*: Version .* Starting +rpc.statd.*: Caught signal 15, un-registering and exiting + +[automount] +automount.*: expired +automount.*: attempting to mount entry +automount.*: lookup\(file\): .* failed +automount.*: starting automounter +automount.*: using kernel protocol +automount.*: shutting down +automount.*: .* No such key in map + +[crond] +CROND.*: \(mailman\) CMD \(/usr/bin/python +CROND.*: \(root\) CMD \(.*/sbin/rmmod -as\) +CROND.*: \(root\) CMD \(/usr/lib/sa/sa\d +CROND.*: \(root\) CMD \(run-parts +anacron.*: Updated timestamp for job + +[bind] +named.*: lame server resolving +named.*: .* NS points to CNAME +named.*: Response from unexpected source +named.*: .* All possible A RR's lame +named.*: bad referral +named.*: Cleaned cache +named.*: USAGE +named.*: NSTATS +named.*: XSTATS +named.*: .* points to a CNAME +named.*: denied update from +named.*: .* Bogus LOOPBACK + +[gnome] +gnome-name-server.*: input condition is: +gnome-name-server.*: name server starting +gnome-name-server.*: starting +gnome-name-server.*: name server was running +gconfd.*: Resolved address +gconfd.*: GConf server is not in use +gconfd.*: Exiting +gconfd.*: starting +gconfd.*: .* shutting down cleanly +gdm.*: Couldn't authenticate user +xscreensaver.*: FAILED LOGIN + +[sshd] +sshd.*: Generating new .* key. +sshd.*: .* key generation complete +sshd.*: Connection closed +sshd.*: Could not reverse map address +sshd.*: Received disconnect from +sshd.*: error: Could not get shadow information for +sshd.*: Invalid user .* from + +[xinetd] +xinetd.*: .* Transport endpoint is not connected +xinetd.*: EXIT: + +[uw-imap] +imapd.*: AUTHENTICATE +imapd.*: Logout +imapd.*: Killed +imapd.*: imap.*service init +imapd.*: Command stream end of file +imapd.*: Autologout +imapd.*: Connection reset by peer +ipop3d.*: AUTHENTICATE +ipop3d.*: Logout +ipop3d.*: Killed +ipop3d.*: Autologout +ipop3d.*: pop3.*service init + +[courier-imap] +imapd.*: Connection, ip=\[\S+\] +imapd.*: LOGOUT, user=\S+, ip=\[\S+\] +imapd.*: Disconnected, ip=\[\S+\] +imapd.*: DISCONNECTED, user=\S+, ip=\[\S+\] +imapd.*: LOGOUT, ip=\[\S+\] +pop3d.*: Connection, ip=\[\S+\] +pop3d.*: LOGOUT, user=\S+, ip=\[\S+\] +pop3d.*: Disconnected, ip=\[\S+\] +pop3d.*: DISCONNECTED, user=\S+, ip=\[\S+\] +pop3d.*: LOGOUT, ip=\[\S+\] + +[postfix] +postfix/smtp\[\d+\]: connect to +postfix/smtp\[\d+\]: warning: no MX host +postfix/smtp\[\d+\]: warning: numeric domain name in resource data +postfix/smtp\[\d+\]: warning: host .* with my own hostname +postfix/smtpd.*: connect from +postfix/smtpd.*: disconnect from +postfix/smtpd.*: TLS connection established +postfix/smtpd.*: lost connection +postfix/cleanup +postfix/pickup + +[sendmail] +sendmail\[.*:.*NOQUEUE: Null connection from +sendmail\[.*:.*timeout waiting for input + +[qmail] +qmail:.* new msg +qmail:.* end msg +qmail:.* status: + +[spamd] +spamd\[.*: info: +spamd\[.*: processing message +spamd\[.*: checking message +spamd\[.*: connection from +spamd\[.*: Creating default_prefs + +[printer] +printer: ready to print +printer: status change +printer: printing +printer: peripheral low-power state + +[pumpd] +pumpd.*: renewed lease for interface +pumpd.*: configured interface + +[afpd] +afpd.*: ASIP session: +afpd.*: afp_flushfork: +afpd.*: .*B read,.*B written + +[ntpd] +ntpd.*: kernel time discipline status change + +[kernel] +kernel: application .* uses obsolete OSS audio interface +kernel: SELinux: initialized +kernel: device .* left promiscuous mode +kernel: .*: disabled promiscuous mode +usb-uhci.c: interrupt, status +PCI: Found IRQ +PCI: Sharing IRQ +PCI: Setting latency timer +kernel: agpgart: Found +kernel: agpgart: Putting + +[misc] +modprobe: Can't locate module +logger: punching nameserver .* through the firewall +HORDE\[\S*\s*\[imp\] Logout +LOGIN ON tty. +dhclient: DHCPREQUEST +dhclient: DHCPACK +dhclient: DHCPDISCOVER +dhclient: bound to +dbus: avc: .* buckets used + + + +## $Revision: 1.14.2.4 $ ## diff --git a/roles/epylog/files/merged/weed_local.cf b/roles/epylog/files/merged/weed_local.cf new file mode 100644 index 0000000000..77c1ea5a92 --- /dev/null +++ b/roles/epylog/files/merged/weed_local.cf @@ -0,0 +1,305 @@ +[ADD] +## +# Here is where you add your own rules +# + +ansible.*: Invoked.* +ansible-accelerate:.* +auditd.*: Audit daemon rotating log files +collectd.*: Filter subsystem.* +collectd.*: Value too old.* +collectd.*: processes plugin: Failed to read from.* +dbus.*:.*avc:.*received.* +dbus.*:.*Reloaded configuration.* +dbus.*:.*Successfully activated service 'org.fedoraproject.Setroubleshootd'.* +dbus.*:.*\[system\].*Activating.*using servicehelper.* +dbus-daemon.*:.*Successfully activated service \'org.fedoraproject.Setroubleshootd\'.* +dhclient.*: bound to.* +dhclient.*: DHCPDISCOVER.* +dhclient.*: DHCPACK.* +dhclient.*: DHCPREQUEST.* +dhcpd:.*Wrote.*leases file.* +dnsmasq-dhcp.* +# work around bug https://bugzilla.redhat.com/show_bug.cgi?id=947989 +dhclient.*: send_packet: Operation not permitted +dhclient.*: dhclient.c:2663: Failed to send 300 byte long packet over fallback interface. +dhclient.*: Internet Systems Consortium DHCP Client.* +dhclient.*: Copyright 2004-2013 Internet Systems Consortium. +dhclient.*: All rights reserved. +dhclient.*: For info, please visit https://www.isc.org/software/dhcp/ +dhclient.*: Listening on.* +dhclient.*: Sending on.* +dhclient.*: Sending on.* +dhclient.*: $ +freshclam.*: Can't connect to port 80 of host.* +freshclam.*: connect_error:.* +freshclam.*: Downloading.* +freshclam.*:.*is up to date.* +freshclam.*:.*updated.* +freshclam.*: Database updated.* +freshclam.*: ClamAV update process started +git-daemon.*: Connection from.* +git-daemon.*: Connection reset by peer +git-daemon.*: .* does not appear to be a git repository +git-daemon.*: Extended attributes.* +git-daemon.*: Request upload-pack.* +git-daemon.*: The remote end hung up unexpectedly +git-daemon.*: userpath.* +git-daemon.*: Request upload-archive for.* +git-daemon.*: fatal: write error: Connection timed out +groupadd.*: group added to.*: name=(mockbuild|dialout|floppy|cdrom|tape|utmp|utempter|dbus|avahi-autoipd|rpc|rpcuser|nfsnobody|ssh_keys).* +(group|user)add.*: new (user|group): name=(mockbuild|dialout|floppy|cdrom|tape|utmp|utempter|dbus|avahi-autoipd|rpc|rpcuser|nfsnobody|ssh_keys).* +heartbeat.* info:.* +heartbeat.*:info.* +heartbeat.*:WARN: Gmain_timeout_dispatch: Dispatch function for retransmit request took too long to execute.* +in.tftpd.*: tftp: client does not accept options +kernel:.*CPU.*power limit.* +kernel:.*dma-pl330 fff3d000.dma: Reset Channel.* +kernel: TCPv6: Possible SYN flooding on port 80. Sending cookies. +kernel: TCPv6: Possible SYN flooding on port 80. Dropping request. +kernel: possible SYN flooding on port 80. Sending cookies. +kernel: EXT4-fs \(.*\): mounted filesystem with ordered data mode.* +kernel: ioctl32\(e2fsck.* +kernel: ioctl32\(resize2fs.* +kernel: md: data-check of RAID array.* +kernel: md: delaying data-check of.* +kernel: md: md.*: data-check done. +kernel: md: minimum _guaranteed_ speed.* +kernel: md: using 128k window.* +kernel: md: using maximum available idle IO bandwidth.* +kernel: printk.*suppressed. +kernel: __ratelimit:.*callbacks suppressed +kernel:.*subj=.* +kernel:.*exe=.* \(sauid=.*, hostname=.* addr=.* terminal=.*\) +kernel:.*type=.*audit\(.* +kernel:.*audit_printk_skb:.*callbacks suppressed +lvm.*: Another thread is handling an event. Waiting...* +nagios: Auto-save of retention data completed successfully +nagios: CURRENT.* +nagios: EXTERNAL COMMAND.* +nagios: LOG.* +nagios: PASSIVE SERVICE CHECK.* +nagios: SERVICE ALERT.* +nagios: SERVICE FLAPPING ALERT.* +nagios: SERVICE NOTIFICATION.* +nagios: Warning:.*Passive check result was received for service.* +nagios: Warning: The results of service.* are stale.* +named.*: .* general: info:.* +named.*: .* notify: info:.* +named.*: .* general: error: zone.*unchanged. zone may fail to transfer to slaves. +named.*: .* resolver: notice: DNS format error from.*: invalid response +named.*: .* resolver: notice: DNS format error from.*: non-improving referral +named.*: .* security: info: client.*: view.*: query (cache).*denied +named.*: .* edns-disabled: info: success resolving.*after.* +named.*: .* security: info: client.*denied +named.*: .* rate-limit: info:.* +named.*: .* general: warning: checkhints: view.* +NetworkManager.*: \Count | Log |
---|---|
%s | %s | \n
\nComplete messages\n\n" + res += ''.join(sorted(open(self.complete, 'r').readlines())) + res += "\n | \n
%s | \n' % (bgcolor, host) + line = line + '\t\t\n' % bgcolor
+ for loc in hostloc[host]:
+ line = line + '\t\t\t%s \n' % loc + line = line + '\t\t | \n'
+ size, marker = self.mk_size_unit(hosttotal[host])
+ line = line + '\t\t%s%s | \n' % (bgcolor, size, marker) + line = line + '\t