Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Investigating an intrusion with fake logs

    Scheduled Pinned Locked Moved IDS/IPS
    14 Posts 8 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NollipfSenseN
      NollipfSense @myfamilydeservesbetter
      last edited by NollipfSense

      @myfamilydeservesbetter said in Investigating an intrusion with fake logs:

      Forcing a reload, which is a felony.

      Not at all, from a network administrator perspective as, it quickly allows change implementation.

      Remember, the NIC sees the traffic before the firewall does which will block that traffic since no source from LAN originated it.

      pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
      pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

      1 Reply Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8
        last edited by

        What fake logs?

        M 1 Reply Last reply Reply Quote 1
        • M
          michmoor LAYER 8 Rebel Alliance @Bob.Dig
          last edited by

          @Bob-Dig I am curious to about these fake logs.

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          myfamilydeservesbetterM 1 Reply Last reply Reply Quote 0
          • myfamilydeservesbetterM
            myfamilydeservesbetter @michmoor
            last edited by

            @michmoor
            @Bob-Dig

            The live ip in action (in double terminated brackets above) was changed to the AT&T ip address when i rebooted my system as a precaution.

            Same date/time and sniffed packet violations.

            My assumption is this is standard operating procedure using a VPN, something I would consider doing if i was a felonious hacker probing matt oliver's computer do because only a moron hacks from a compromised system, which is inevitable as well as the result of this malicious maneuver of a peon apparently looking for a needle in a haystack, whether it be crypto (no interest), or a hot file to sell to a da to esacpe his next court case presumably also (a rat).

            NollipfSenseN 1 Reply Last reply Reply Quote 0
            • NollipfSenseN
              NollipfSense @myfamilydeservesbetter
              last edited by

              @myfamilydeservesbetter said in Investigating an intrusion with fake logs:

              @michmoor
              @Bob-Dig

              The live ip in action (in double terminated brackets above) was changed to the AT&T ip address when i rebooted my system as a precaution.

              Same date/time and sniffed packet violations.

              My assumption is this is standard operating procedure using a VPN, something I would consider doing if i was a felonious hacker probing matt oliver's computer do because only a moron hacks from a compromised system, which is inevitable as well as the result of this malicious maneuver of a peon apparently looking for a needle in a haystack, whether it be crypto (no interest), or a hot file to sell to a da to esacpe his next court case presumably also (a rat).

              Yet, you have not answered the question...what fake log? Show us, will you?

              pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
              pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @NollipfSense
                last edited by

                @NollipfSense

                and +1 from me.
                See my foot note, just below, for further explanation.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                myfamilydeservesbetterM 1 Reply Last reply Reply Quote 1
                • myfamilydeservesbetterM
                  myfamilydeservesbetter @Gertjan
                  last edited by

                  @Gertjan if you have nothing to contribute, than gtfo my thread BITCH.

                  M bingo600B GertjanG bmeeksB 4 Replies Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @myfamilydeservesbetter
                    last edited by

                    @myfamilydeservesbetter cmon dude….

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @myfamilydeservesbetter
                      last edited by bingo600

                      myfamilydeservesbetter said in Investigating an intrusion with fake logs:
                      @Gertjan if you have nothing to contribute, than gtfo my thread BITCH.

                      Well I think he was asking you to contribute the logs, which seems perfectly valid.
                      9cd4dd0d-6e82-4964-9e41-7f9d269cdbf2-image.png

                      @myfamilydeservesbetter
                      Btw: You are now only 1 more rude post from ending on my forum blocklist.

                      /Bingo

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @myfamilydeservesbetter
                        last edited by

                        @myfamilydeservesbetter said in Investigating an intrusion with fake logs:

                        if you have nothing to contribute

                        I have, and I'm going to.
                        This :

                        intrusion with fake logs

                        is serious.
                        Yet, all I have is these four words.
                        I presume you saw the logs.
                        If possible, remove private items share them, post them here.

                        The logs, not always well understood, are there to indicate what happened with the system with a time stamp, and as such a very important analysis tool.

                        If a system got breached, some one not authorized logins in, the very first thing he would do is modifying the logs to wipe out his "visits".
                        Like : breaking into a store, and remove the videos of all the security cameras first.

                        Also : sharing examples of log examples on the forum will helps other to recognize situations.

                        @bingo600 said in Investigating an intrusion with fake logs:

                        1 more rude post

                        I didn't meant to be rude, as such behavior doesn't contribute to "finding answers". My way of motivating people to share as much possible info is/was maybe somewhat harsh.
                        You are, of course, totally free to interpret my words.
                        I was just asking for the logs .... because the subject of this thread is about logs.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        bingo600B 1 Reply Last reply Reply Quote 0
                        • bingo600B
                          bingo600 @Gertjan
                          last edited by

                          @Gertjan

                          I didn't mean you were rude (sorry) .. You just wanted to be helpfull

                          I surely meant OP

                          /Bingo

                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                          pfSense+ 23.05.1 (ZFS)

                          QOTOM-Q355G4 Quad Lan.
                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                          1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks @myfamilydeservesbetter
                            last edited by bmeeks

                            @myfamilydeservesbetter said in Investigating an intrusion with fake logs:

                            @Gertjan if you have nothing to contribute, than gtfo my thread BITCH.

                            This tone and language is most certainly uncalled for. As the moderator for this sub-forum, consider this your first warning. Please tone down the rhetoric.

                            1 Reply Last reply Reply Quote 1
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yup that^. Keep it civil please.

                              I will add that if you're running Snort on WAN you're going to see a lot of hits. Generally unless you are forwarding traffic to internal services they are not really useful.

                              Steve

                              1 Reply Last reply Reply Quote 2
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.