Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/http-path-traversal-probing.yaml

26 lines
750 B
YAML

# path traversal probing
type: leaky
#debug: true
name: crowdsecurity/http-path-traversal-probing
description: "Detect path traversal attempt"
filter: "evt.Meta.log_type in ['http_access-log', 'http_error-log'] && any(File('http_path_traversal.txt'),{evt.Meta.http_path contains #})"
data:
- source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/master/web/path_traversal.txt
dest_file: http_path_traversal.txt
type: string
groupby: "evt.Meta.source_ip"
distinct: "evt.Meta.http_path"
capacity: 3
reprocess: true
leakspeed: 10s
blackhole: 2m
labels:
remediation: true
classification:
- attack.T1595.002
behavior: "http:exploit"
label: "HTTP Path Traversal Exploit"
service: http
spoofable: 0
confidence: 3