instruction
stringclasses 1
value | input
stringlengths 2.77k
14.4k
| output
stringclasses 2
values |
---|---|---|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636836", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636836, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59500, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:36", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "f8eba9906c98535438f9dc02bc488eaa", "proto": "ssl", "xff": "", "alarm_id": "20241127_193b8414a0b293024c46405757431ac8", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:36", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636791", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59500", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636835", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网益阳供电公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636835, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 56965, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvdH5AAHoGGVasEaojdh+l4N6FAbtpZgffUeKRyFAYAgOjsAAAFgMBAMIBAAC+AwOg6svRi0wscY5wKIKOYg2u2jsbLN5v5UxqNjXXLPQsggAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:35", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvdH5AAHoGGVasEaojdh+l4N6FAbtpZgffUeKRyFAYAgOjsAAAFgMBAMIBAAC+AwOg6svRi0wscY5wKIKOYg2u2jsbLN5v5UxqNjXXLPQsggAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.170.35", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "6138f40c715cefd905252ce0c895d066", "proto": "ssl", "xff": "", "alarm_id": "20241127_bce1ecd59f244780b0f539ad8c5c3162", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:35", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636791", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.170.35", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网益阳供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "56965", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636835", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636835, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61793, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8DjQAAD4R8z2sH0I6rB/gxvFhADUAKEmSk7oBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:35", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8DjQAAD4R8z2sH0I6rB/gxvFhADUAKEmSk7oBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "dns", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:35", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636831", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61793", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636835", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636835, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 408, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 388, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 477, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 59500, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "388", "skyeye_id": "", "payload": {"packet_data": "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"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:35", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "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", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.66.58", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "40a5b4177535f517fe5a10d400f6a8a4", "proto": "ssl", "xff": "", "alarm_id": "20241127_9fae6432c1ab26b61813a0664196d5c8", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:35", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636831", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.66.58", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "408", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "477", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "59500", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636833", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732636833, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.249.9.246", "site_app": "通用", "hit_end": 92, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 72, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.19.1.128", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 62942}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 00:00:33", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "123.249.9.246", "passwd": "719401081", "skyeye_index": "", "sip_ioc_dip": "45263f64c76427d6afdd33bed3404edf", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "719401081", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732636775", "code_language": "通用", "vendor": "gnway", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "92", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.19.1.128", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.249.9.246", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "72", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT03MTk0MDEwODEmcGFzc3dkPTcxOTQwMTA4MSZ2ZW5kb3I9Z253YXkgSFRUUC8xLjENCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IHpoLUNODQpIb3N0OiBnbmxhbmluZGV4Lmdud2F5LmNvbQ0KQ29ubmVjdGlvbjoga2VlcC1BbGl2ZQ0KDQo=", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxNjowMDozMyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni4xNzY7ODM7"}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.176;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_74770db8c6a8d131e5754eb3e75ec128", "access_time": "2024-11-27 00:00:33", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "未知", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.1.128", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 16:00:33 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"719401081\", \"password\": \"719401081\"}}", "sport": "62942", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636829", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636829, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 331, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61789, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE9lo5AAHwGZGWsE4smL2CcLfFdAbt/qpMx0AFq61AYBAESOQAAFgMBARABAAEMAwPHQCv588u4/5etWOuxr0q2y5jALjmropT15xLsTeSGJSD25Nw+n6RUuS0JWRouo9l/Du9QDcDHeq6p/4KydvT6UQAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACDbLpzgW+4IQSRBu4R41p4NAL5QUYbZ3CRnIU0sCUNnSw=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:29", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE9lo5AAHwGZGWsE4smL2CcLfFdAbt/qpMx0AFq61AYBAESOQAAFgMBARABAAEMAwPHQCv588u4/5etWOuxr0q2y5jALjmropT15xLsTeSGJSD25Nw+n6RUuS0JWRouo9l/Du9QDcDHeq6p/4KydvT6UQAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACDbLpzgW+4IQSRBu4R41p4NAL5QUYbZ3CRnIU0sCUNnSw==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.139.38", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "11df88f2a661fda8f11a87e5ee1fac45", "proto": "ssl", "xff": "", "alarm_id": "20241127_2db4169ded47ee2744dbef301e578b59", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:29", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636791", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "331", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61789", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636829", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636829, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51958, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvGoBAAHsGCxasH2D2L2Oc+sr2AbtgyWxr8gDP1lAYBAEV4wAAFgMBAMIBAAC+AwMYL7uzRWUH/djMPY3tcUaDHbkx8zytu3HxI6acBxTb7wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:29", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvGoBAAHsGCxasH2D2L2Oc+sr2AbtgyWxr8gDP1lAYBAEV4wAAFgMBAMIBAAC+AwMYL7uzRWUH/djMPY3tcUaDHbkx8zytu3HxI6acBxTb7wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "483799dbf69f0565deaef38d58e1a89b", "proto": "ssl", "xff": "", "alarm_id": "20241127_f9044c346fdd793a6fc2c340d26b7f6e", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:29", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636791", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51958", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636829", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "47.99.156.250", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636829, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.99.156.250", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51958, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAADvGoBAAH4GCBasH2D2L2Oc+sr2AbtgyWxr8gDP1lAYBAEV4wAAFgMBAMIBAAC+AwMYL7uzRWUH/djMPY3tcUaDHbkx8zytu3HxI6acBxTb7wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:29", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAADvGoBAAH4GCBasH2D2L2Oc+sr2AbtgyWxr8gDP1lAYBAEV4wAAFgMBAMIBAAC+AwMYL7uzRWUH/djMPY3tcUaDHbkx8zytu3HxI6acBxTb7wAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.96.246", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "8d70a01584085aef78b2d2592331e360", "proto": "ssl", "xff": "", "alarm_id": "20241127_ffd94c5b3dfac732fe5d88ba531393ec", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:29", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636831", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.96.246", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51958", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636828", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636828, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 206, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 186, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 43630, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "186", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4aKBAAD4G1w6sH1ABbxeRGapudTAksKKTAhMewIAYBbQR8QAAAQEICgzdyuc/gnI5bwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYjUxZWRiNGM2NmQ4NzA5YzIyZmE5OWQzMDE0YzkzODMiLCJ0aW1lc3RhbXAiOjE3MzI2MzY4MjAsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:28", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4aKBAAD4G1w6sH1ABbxeRGapudTAksKKTAhMewIAYBbQR8QAAAQEICgzdyuc/gnI5bwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiYjUxZWRiNGM2NmQ4NzA5YzIyZmE5OWQzMDE0YzkzODMiLCJ0aW1lc3RhbXAiOjE3MzI2MzY4MjAsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 00:00:28", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636831", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "206", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "43630", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636827", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636827, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 5081, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6ExNAADwGGlasE5j0L2CcLRPZAbsblhSlFW2iGFAYAgPPTQAAFgMBAM0BAADJAwP+gKzh1+YOH3GxQOz5OcaLq9WsGj9pBt9x4QJS+DgffgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:27", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6ExNAADwGGlasE5j0L2CcLRPZAbsblhSlFW2iGFAYAgPPTQAAFgMBAM0BAADJAwP+gKzh1+YOH3GxQOz5OcaLq9WsGj9pBt9x4QJS+DgffgAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.152.244", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "42439089e6036890825644d25e52c48a", "proto": "ssl", "xff": "", "alarm_id": "20241127_7882c0937d8c94c2b577a53837454bf3", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:27", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636791", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.152.244", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "5081", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636823", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732636823, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "123.60.84.3", "site_app": "通用", "hit_end": 92, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 72, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.19.1.128", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 62938}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.com/group/client_group_ip.php", "first_access_time": "2024-11-27 00:00:23", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "123.60.84.3", "passwd": "719401081", "skyeye_index": "", "sip_ioc_dip": "6e21aeca445dd7519c8b3406b2ca9f4f", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "719401081", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732636765", "code_language": "通用", "vendor": "gnway", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "92", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.19.1.128", "host_md5": "847fcaf1cce4681c1c702b43286d5c70", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "123.60.84.3", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "72", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT03MTk0MDEwODEmcGFzc3dkPTcxOTQwMTA4MSZ2ZW5kb3I9Z253YXkgSFRUUC8xLjENCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IHpoLUNODQpIb3N0OiBnbmxhbmluZGV4Lmdud2F5LmNvbQ0KQ29ubmVjdGlvbjoga2VlcC1BbGl2ZQ0KDQo=", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxNjowMDoyMyBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni40NDs4Mzs="}, "host": "gnlanindex.gnway.com", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.44;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_2665dc09f3811bc1986bf1080a448163", "access_time": "2024-11-27 00:00:23", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--香港特别行政区--中国香港", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.1.128", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 16:00:23 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.com\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"719401081\", \"password\": \"719401081\"}}", "sport": "62938", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636822", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网湖南防灾减灾中心", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636822, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.206", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58273, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE51PBAADsG3c2sEkLOeccjWeOhAbvu8y58O8Jd3FAYAgNuAgAAFgMBAQwBAAEIAwNGWRvcoIFjCt3jSGWHxEZ0EyuRlZX2kH8YxNHdr2edFiBr4m+crfRFzMgEqhYlNwA0yENI8I/853Rcujw7BCHyZAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIN86e4nGaVU2bZosSVX74zKY+Ru4OUIqpXKDr+YjZVYc"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:22", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE51PBAADsG3c2sEkLOeccjWeOhAbvu8y58O8Jd3FAYAgNuAgAAFgMBAQwBAAEIAwNGWRvcoIFjCt3jSGWHxEZ0EyuRlZX2kH8YxNHdr2edFiBr4m+crfRFzMgEqhYlNwA0yENI8I/853Rcujw7BCHyZAAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIN86e4nGaVU2bZosSVX74zKY+Ru4OUIqpXKDr+YjZVYc", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.206", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "85bea28033526c31b657b869bc47b1c4", "proto": "ssl", "xff": "", "alarm_id": "20241127_d6240e1ac253c9d798142697be448317", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:22", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.206", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网湖南防灾减灾中心", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58273", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636822", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636822, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 49971, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv0w5AAHwGgdesE+EPdh+l4MMzAbvIC2dQk/hPuFAYBAGyOgAAFgMBAMIBAAC+AwMh5z18z3+61pU1SH2B4lR/Si62kJQkF7nnm8DT6PMNbQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:22", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv0w5AAHwGgdesE+EPdh+l4MMzAbvIC2dQk/hPuFAYBAGyOgAAFgMBAMIBAAC+AwMh5z18z3+61pU1SH2B4lR/Si62kJQkF7nnm8DT6PMNbQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.225.15", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "afa7f0d50d4b810ec04daadb58570ba5", "proto": "ssl", "xff": "", "alarm_id": "20241127_c4d2d8ac5125f291cfde4357a193c178", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:22", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.225.15", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "49971", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636821", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.140.51", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636821, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.140.51", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.248.15", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 53386, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvOBNAADsGp0CsEPgPL2KMM9CKAbvHutEJDPIMVlAYQHE77gAAFgMBAMIBAAC+AwPRG2jlcK4lBWjFR+m7cqwJrIfqTfAPByEcnrO5SiVLrwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:21", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvOBNAADsGp0CsEPgPL2KMM9CKAbvHutEJDPIMVlAYQHE77gAAFgMBAMIBAAC+AwPRG2jlcK4lBWjFR+m7cqwJrIfqTfAPByEcnrO5SiVLrwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.248.15", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "310072c7a97ea0311bac75b27fe12ab1", "proto": "ssl", "xff": "", "alarm_id": "20241127_f134de613853cd908af7063cdc529c1a", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:21", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.248.15", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "53386", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636821", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636821, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.18.66.69", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 50881, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6avRAAHsGPpWsEkJFeBvvAcbBAbu590j0TNPbWFAYAQGQJQAAFgMBAM0BAADJAwNfTMDWzkx1o6UHH86x2VCiueUyddnBvKxszRdxGQPtgwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:21", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6avRAAHsGPpWsEkJFeBvvAcbBAbu590j0TNPbWFAYAQGQJQAAFgMBAM0BAADJAwNfTMDWzkx1o6UHH86x2VCiueUyddnBvKxszRdxGQPtgwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.18.66.69", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "130a8bbc5c4d760eb2e8e27fd3460c4b", "proto": "ssl", "xff": "", "alarm_id": "20241127_69be984f501f74e8188d45e6a817a792", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:21", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.18.66.69", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "50881", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636819", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636819, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 64518, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6bhhAAHwGwv+sE4OyeccjWfwGAbvlNVOHdCM4H1AYBAF6/AAAFgMBAM0BAADJAwO6Yc4hb7MZ4fA+3tterIlyzFq0Ybb/kIc8iNaeO+ri+AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:19", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6bhhAAHwGwv+sE4OyeccjWfwGAbvlNVOHdCM4H1AYBAF6/AAAFgMBAM0BAADJAwO6Yc4hb7MZ4fA+3tterIlyzFq0Ybb/kIc8iNaeO+ri+AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.131.178", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "3ee27315417c85222dadb13e0622d797", "proto": "ssl", "xff": "", "alarm_id": "20241127_bf189f31c7f0ed6dd0ffda7a9f5732d0", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:19", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.131.178", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "64518", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636817", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636817, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.89.36", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58203, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD643JAAHwGScasE1kkL2CcLeNbAbvCRaa7Mz7oA1AYAP8A5wAAFgMBAM0BAADJAwOT7eu1RSkoEHqPAmOKnEfbrngqb54UlmFgYCiRdDYcxQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:17", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD643JAAHwGScasE1kkL2CcLeNbAbvCRaa7Mz7oA1AYAP8A5wAAFgMBAM0BAADJAwOT7eu1RSkoEHqPAmOKnEfbrngqb54UlmFgYCiRdDYcxQAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.89.36", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "500c5c29cf76b9d78cfa784c9c9cf3ad", "proto": "ssl", "xff": "", "alarm_id": "20241127_9dc6004f440e93c24dcbe554a6e059be", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:17", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.89.36", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58203", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636816", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.232.26", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636816, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.232.26", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.174.8", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58863, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADv/sBAAHoGj7GsEa4IL2LoGuXvAbss95iosV8UtlAYAgOE+QAAFgMBAMIBAAC+AwOvWB+DUAOTdlMbOKi4yb+zST6+bWDLgRA4Sj2TFXAkmwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:16", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADv/sBAAHoGj7GsEa4IL2LoGuXvAbss95iosV8UtlAYAgOE+QAAFgMBAMIBAAC+AwOvWB+DUAOTdlMbOKi4yb+zST6+bWDLgRA4Sj2TFXAkmwAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.174.8", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "fff0a80e8af9ba390c8ff879b2bd80f5", "proto": "ssl", "xff": "", "alarm_id": "20241127_eee77066c8047145f4ef62d1c3e9834c", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:16", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.174.8", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58863", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636815", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "121.199.35.89", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636815, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "121.199.35.89", "protocol_id": 6, "hit_end": 169, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 149, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 230, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 62279, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "149", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADYjUgAAHwG6JWsH38CeccjWfNHAbtdvP1lVBuyH1AYAEQokAAAFgMBAKsBAACnAwN9RR4EcrtY7v0AJ490WPcv19jvchBl5QG1xuwyobBl4wAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:15", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADYjUgAAHwG6JWsH38CeccjWfNHAbtdvP1lVBuyH1AYAEQokAAAFgMBAKsBAACnAwN9RR4EcrtY7v0AJ490WPcv19jvchBl5QG1xuwyobBl4wAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:15", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "169", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "230", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "62279", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636813", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "省公司", "type": "弱口令", "_origin": {"write_date": 1732636813, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "121.37.225.23", "site_app": "通用", "hit_end": 92, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 72, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.19.1.128", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 62932}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 00:00:13", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "Web弱口令登录", "alarm_sip": "121.37.225.23", "passwd": "719401081", "skyeye_index": "", "sip_ioc_dip": "7a5c0a7d4f6cf0c68c9e8c30fb0e3171", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "719401081", "dport": "80", "alert_devip": "172.31.191.8", "update_time": "1732636753", "code_language": "通用", "vendor": "gnway", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/jYtc", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "92", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.19.1.128", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "121.37.225.23", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "72", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT03MTk0MDEwODEmcGFzc3dkPTcxOTQwMTA4MSZ2ZW5kb3I9Z253YXkgSFRUUC8xLjENCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IHpoLUNODQpIb3N0OiBnbmxhbmluZGV4Lmdud2F5LmNuDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxNTo1OTo1NCBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni4xNzc7ODM7"}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.177;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_7028c76a184ee58c156de18998e3f087", "access_time": "2024-11-27 00:00:13", "attack_addr": "中国--湖南省--长沙市(28.1975/112.968307)", "type_chain": "160E0000", "dip_addr": "中国--广东省--广州市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.1.128", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "00:24:ac:dd:9d:fb", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 15:59:54 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "省公司", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"719401081\", \"password\": \"719401081\"}}", "sport": "62932", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636813", "rule_version_str": "3.0.1122.14572", "dip_group": "未知资产组", "nid": "", "sip_group": "未分配资产组", "type": "弱口令", "_origin": {"write_date": 1732636813, "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "121.37.225.23", "site_app": "通用", "hit_end": 92, "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dport": 80, "vuln_name": "Web弱口令登录", "rsp_status": 200, "code_language": "通用", "solution": "将弱口令修改为强口令。", "hit_start": 72, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "xff": "", "sip": "172.19.1.128", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "public_date": "2020-06-29 15:22:32", "sport": 62932}, "detail_info": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "file_md5": "5fbea4c9ffa0d86789a3449c1cec20c1", "rule_key": "webids", "connection": "keep-Alive", "api": "gnlanindex.gnway.cn/group/client_group_ip.php", "first_access_time": "2024-11-27 00:00:13", "hazard_level": "6", "hazard_rating": "高危", "group_name": "gn_osp", "hit_field": "req_header", "h_method": "GET", "sip_addr": "局域网", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Web弱口令登录", "alarm_sip": "121.37.225.23", "passwd": "719401081", "skyeye_index": "", "sip_ioc_dip": "d5bb111e1e9ae4d187cf086c356dd91f", "xff": "", "vuln_desc": "发现有弱口令登录行为,此告警产生原因可能如下:\r\n1、实际使用口令为弱口令,触发了弱口令漏洞告警机制;\r\n2、攻击者尝试用弱口令登录以求获得更大的权限。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被人猜解,造成个人信息等数据丢失严重者可导致网站被攻陷。", "user_name": "719401081", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732636795", "code_language": "通用", "vendor": "gnway", "public_date": "2020-06-29 15:22:32", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "92", "h_proto_version": "HTTP/1.1", "uri": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway", "dst_mac": "64:3e:8c:44:c0:e6", "is_delete": "0", "rule_id": "0x100011e9", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.19.1.128", "host_md5": "01538d56f084bc640d9468734d68fa71", "vlan_id": "", "vuln_type": "Web弱口令登录", "attack_type": "弱口令", "is_web_attack": "1", "dip": "121.37.225.23", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "将弱口令修改为强口令。", "hit_start": "72", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ncm91cC9jbGllbnRfZ3JvdXBfaXAucGhwP2dyb3VwX25hbWU9Z25fb3NwJnVzZXJfbmFtZT03MTk0MDEwODEmcGFzc3dkPTcxOTQwMTA4MSZ2ZW5kb3I9Z253YXkgSFRUUC8xLjENCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IHpoLUNODQpIb3N0OiBnbmxhbmluZGV4Lmdud2F5LmNuDQpDb25uZWN0aW9uOiBrZWVwLUFsaXZlDQoNCg==", "req_body": "", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpTZXJ2ZXI6IG9wZW5yZXN0eS8xLjEzLjYuMg0KRGF0ZTogVHVlLCAyNiBOb3YgMjAyNCAxNTo1OTo1NCBHTVQNCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFpbg0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "rsp_body": "QXV0aFJlc3VsdDswMDsxMTguMTkwLjE3Ni4xNzc7ODM7"}, "host": "gnlanindex.gnway.cn", "host_state": "企图", "accept-language": "zh-CN", "rsp_body": "AuthResult;00;118.190.176.177;83;", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_553d7b3ef80940cc124b509c593cac15", "access_time": "2024-11-27 00:00:13", "attack_addr": "局域网", "type_chain": "160E0000", "dip_addr": "中国--广东省--广州市", "rsp_status": "200", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.1.128", "dimension": "2", "url_path": "/group/client_group_ip.php", "src_mac": "e0:97:96:51:6e:86", "file_name": "client_group_ip.php", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: openresty/1.13.6.2\r\nDate: Tue, 26 Nov 2024 15:59:54 GMT\r\nContent-Type: text/plain\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway HTTP/1.1\r\nAccept: */*\r\nAccept-Language: zh-CN\r\nHost: gnlanindex.gnway.cn\r\nConnection: keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440041-Web弱口令登录", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"719401081\", \"password\": \"719401081\"}}", "sport": "62932", "h_url": "/group/client_group_ip.php?group_name=gn_osp&user_name=719401081&passwd=719401081&vendor=gnway"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"dns_type": "0", "vlan_id": "", "kill_chain": "general", "vuln_type": "Minerd挖矿木马活动事件", "attack_type": "挖矿病毒", "dip_group": "省公司", "is_web_attack": "0", "nid": "bf26030db51de732f1b117f1bfc6d01f", "dip": "114.114.114.114", "sip_group": "", "repeat_count": "1", "type": "挖矿病毒", "skyeye_type": "webids-ioc_dolog", "_origin": {"dns_type": 0, "kill_chain": "general", "attack_type": "挖矿病毒", "dip": "114.114.114.114", "xml_confidence": "high", "dport": 53, "malicious_family": "Minerd", "hit_start": "", "file_direction": "", "file_md5": "", "sip": "172.31.225.203", "severity": 5, "file_content": "", "victim_ip": "172.31.225.203", "tproto": "udp", "dns_arecord": "", "hit_field": "", "hit_end": "", "uri": "", "serial_num": "QbJK/jYtc", "rule_desc": "Minerd挖矿木马活动事件", "filename": "", "proto": "dns", "rule_state": "green", "xff": "", "sport": 63551, "host_md5": "ae9aa662ae129d3764a1f3cdd3b921c2", "access_time": 1732636809000}, "hit_start": "", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAA8HFkAAHsRsIisH+HLcnJycvg/ADUAKKxV/d0BAAABAAAAAAAABGxwbHAFYWNrbmcDY29tAAABAAE="}, "file_md5": "", "host": "lplp.ackng.com", "host_state": "失陷", "rule_key": "host", "api": "", "first_access_time": "2024-11-27 00:00:09", "hazard_level": "5", "hazard_rating": "中危", "tproto": "udp", "packet_data": "ACSsIoQzACSs3Z37CABFAAA8HFkAAHsRsIisH+HLcnJycvg/ADUAKKxV/d0BAAABAAAAAAAABGxwbHAFYWNrbmcDY29tAAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.225.203", "rule_desc": "Minerd挖矿木马活动事件", "filename": "", "skyeye_index": "", "sip_ioc_dip": "8b0b7d553cf531cd6db61ef8024e5c75", "proto": "dns", "xff": "", "alarm_id": "20241127_f777d705af60b8e5837dbf8a4d3c5cff", "attack_chain": "0x03090000", "access_time": "1732636809000", "attack_addr": "", "type_chain": "14140000", "dip_addr": "中国", "xml_confidence": "high", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "malicious_family": "Minerd", "update_time": "1732636767", "branch_id": "QbJK/fzEi", "file_direction": "", "att_ck": "执行:TA0002|用户执行:T1204|恶意链接:T1204.001", "sip": "172.31.225.203", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "severity": "5", "src_mac": "00:24:ac:dd:9d:fb", "file_content": "", "victim_ip": "172.31.225.203", "file_name": "", "confidence": "高", "dns_arecord": "", "super_type": "恶意软件", "super_attack_chain": "0x03000000", "hit_end": "", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "", "attack_org": "Minerd", "is_white": "0", "alarm_sample": "1", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "lplp.ackng.com", "rule_labels": "{\"0x100002\": {\"parent_id\": \"0x100000\", \"type\": \"币种\", \"name\": \"其他\", \"parent_name\": \"挖矿行为\"}, \"0x130106\": {\"parent_id\": \"0x130104\", \"type\": \"攻击阶段\", \"name\": \"远控通信\", \"parent_name\": \"挖矿阶段\"}}", "host_md5": "ae9aa662ae129d3764a1f3cdd3b921c2", "sport": "63551"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"dns_type": "0", "vlan_id": "", "kill_chain": "general", "vuln_type": "Minerd挖矿木马活动事件", "attack_type": "挖矿病毒", "dip_group": "省公司", "is_web_attack": "0", "nid": "bf26030db51de732f1b117f1bfc6d01f", "dip": "8.8.8.8", "sip_group": "", "repeat_count": "1", "type": "挖矿病毒", "skyeye_type": "webids-ioc_dolog", "_origin": {"dns_type": 0, "kill_chain": "general", "attack_type": "挖矿病毒", "dip": "8.8.8.8", "xml_confidence": "high", "dport": 53, "malicious_family": "Minerd", "hit_start": "", "file_direction": "", "file_md5": "", "sip": "172.31.225.203", "severity": 5, "file_content": "", "victim_ip": "172.31.225.203", "tproto": "udp", "dns_arecord": "", "hit_field": "", "hit_end": "", "uri": "", "serial_num": "QbJK/jYtc", "rule_desc": "Minerd挖矿木马活动事件", "filename": "", "proto": "dns", "rule_state": "green", "xff": "", "sport": 63551, "host_md5": "ae9aa662ae129d3764a1f3cdd3b921c2", "access_time": 1732636808000}, "hit_start": "", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAA8MwgAAHsRbq6sH+HLCAgICPg/ADUAKIEq/d0BAAABAAAAAAAABGxwbHAFYWNrbmcDY29tAAABAAE="}, "file_md5": "", "host": "lplp.ackng.com", "host_state": "失陷", "rule_key": "host", "api": "", "first_access_time": "2024-11-27 00:00:08", "hazard_level": "5", "hazard_rating": "中危", "tproto": "udp", "packet_data": "ACSsIoQzACSs3Z37CABFAAA8MwgAAHsRbq6sH+HLCAgICPg/ADUAKIEq/d0BAAABAAAAAAAABGxwbHAFYWNrbmcDY29tAAABAAE=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.225.203", "rule_desc": "Minerd挖矿木马活动事件", "filename": "", "skyeye_index": "", "sip_ioc_dip": "8b0b7d553cf531cd6db61ef8024e5c75", "proto": "dns", "xff": "", "alarm_id": "20241127_f777d705af60b8e5837dbf8a4d3c5cff", "attack_chain": "0x03090000", "access_time": "1732636808000", "attack_addr": "", "type_chain": "14140000", "dip_addr": "美国", "xml_confidence": "high", "dport": "53", "alert_devip": "172.31.191.8", "rsp_status": "", "malicious_family": "Minerd", "update_time": "1732636767", "branch_id": "QbJK/fzEi", "file_direction": "", "att_ck": "执行:TA0002|用户执行:T1204|恶意链接:T1204.001", "sip": "172.31.225.203", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "severity": "5", "src_mac": "00:24:ac:dd:9d:fb", "file_content": "", "victim_ip": "172.31.225.203", "file_name": "", "confidence": "高", "dns_arecord": "", "super_type": "恶意软件", "super_attack_chain": "0x03000000", "hit_end": "", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "", "attack_org": "Minerd", "is_white": "0", "alarm_sample": "1", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "lplp.ackng.com", "rule_labels": "{\"0x100002\": {\"parent_id\": \"0x100000\", \"type\": \"币种\", \"name\": \"其他\", \"parent_name\": \"挖矿行为\"}, \"0x130106\": {\"parent_id\": \"0x130104\", \"type\": \"攻击阶段\", \"name\": \"远控通信\", \"parent_name\": \"挖矿阶段\"}}", "host_md5": "ae9aa662ae129d3764a1f3cdd3b921c2", "sport": "63551"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636808", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "国网湘潭供电公司", "is_web_attack": "0", "nid": "", "dip": "120.27.239.1", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636808, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "120.27.239.1", "protocol_id": 6, "hit_end": 193, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 173, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 264, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.173.5", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 51916, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "173", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAD6HURAADoGYoasEa0FeBvvAcrMAbsfUMxdETgJN1AYAQF8NQAAFgMBAM0BAADJAwNTsjRGNvOO5AopqixEv7ERt/4MxCn9PzcY3Wcwz53kJAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:08", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAD6HURAADoGYoasEa0FeBvvAcrMAbsfUMxdETgJN1AYAQF8NQAAFgMBAM0BAADJAwNTsjRGNvOO5AopqixEv7ERt/4MxCn9PzcY3Wcwz53kJAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAaAAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ACwAEAwABAgAKAAoACAAdABcAGQAYACMAAAANACAAHgYBBgIGAwUBBQIFAwQBBAIEAwMBAwIDAwIBAgICAwAWAAAAFwAA", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.173.5", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "0ff7723a1684f774b5931edf7f2905dd", "proto": "ssl", "xff": "", "alarm_id": "20241127_0eab744094c76e23729d56341cdc473a", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:08", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.173.5", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "193", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "264", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "国网湘潭供电公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "51916", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636808", "vlan_id": "", "vuln_type": "发现使用frp代理工具", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "111.23.145.25", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636808, "rule_name": "发现使用frp代理工具", "hit_field": "", "description": "1", "dip": "111.23.145.25", "protocol_id": 6, "hit_end": 194, "uri": "", "cnnvd_id": "", "dport": 30000, "rule_version": "3.0.1122.14572", "hit_start": 174, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "packet_size": 262, "appid": 0, "proto": "tcp", "xff": "", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "sig_id": 2598, "sport": 43628, "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"}, "hit_start": "174", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAD4zCRAAD4Gc4qsH1ABbxeRGapsdTASJw9MUkQqeoAYBbSPpwAAAQEICgzdwxU/gmpmbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZmI3NWQzNThkNDg1ZDVhMmFhMjhhZmVhZGMzM2U2MTAiLCJ0aW1lc3RhbXAiOjE3MzI2MzY4MDAsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ=="}, "detail_info": "frp是一个可用于内网穿透的高性能的反向代理应用,支持 tcp, udp, http, https 协议。攻击者可以通过此代理工具渗透内网目标。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:08", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "发现使用frp代理工具", "packet_data": "lAScyEuGSEb731OaCABFAAD4zCRAAD4Gc4qsH1ABbxeRGapsdTASJw9MUkQqeoAYBbSPpwAAAQEICgzdwxU/gmpmbwAAAAAAAAC7eyJ2ZXJzaW9uIjoiMC4yOS4wIiwiaG9zdG5hbWUiOiIiLCJvcyI6ImxpbnV4IiwiYXJjaCI6ImFybSIsInVzZXIiOiIiLCJwcml2aWxlZ2Vfa2V5IjoiZmI3NWQzNThkNDg1ZDVhMmFhMjhhZmVhZGMzM2U2MTAiLCJ0aW1lc3RhbXAiOjE3MzI2MzY4MDAsInJ1bl9pZCI6ImU2ZmIwM2JhZjEzMGIyNTUiLCJwb29sX2NvdW50IjoxfQ==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.80.1", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a683b2db02c2187f02fbf6181aed69e6", "proto": "tcp", "xff": "", "alarm_id": "20241127_5f7ba16f89816505e4436b92c9345778", "attack_chain": "0x04010000", "access_time": "2024-11-27 00:00:08", "attack_addr": "中国--湖南省--长沙市(28.211238/112.967240)", "type_chain": "16220000", "description": "1", "dip_addr": "中国--湖南省--长沙市", "dport": "30000", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636800", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.80.1", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x04000000", "hit_end": "194", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a24", "attack_org": "", "is_white": "0", "packet_size": "262", "alarm_sample": "1", "appid": "0", "attack_sip": "111.23.145.25", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23076-发现使用frp代理工具", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2598", "host_md5": "", "sport": "43628", "bulletin": "建议排查主机上是否存在后门程序,并进行全盘查杀,同时排查内网是否存在其他主机被控。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"dns_type": "1", "vlan_id": "", "kill_chain": "general", "vuln_type": "SilverFox远控木马活动事件", "attack_type": "远控木马", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "c65c0880ab0b00f55baecaee92b85d40", "dip": "222.246.129.80", "sip_group": "", "repeat_count": "1", "type": "远控木马", "skyeye_type": "webids-ioc_dolog", "_origin": {"dns_type": 1, "kill_chain": "general", "attack_type": "远控木马", "dip": "222.246.129.80", "xml_confidence": "high", "dport": 53, "malicious_family": "SilverFox", "hit_start": "", "file_direction": "", "file_md5": "", "sip": "172.31.224.198", "severity": 7, "file_content": "", "victim_ip": "172.31.224.198", "tproto": "udp", "dns_arecord": "127.0.0.1", "hit_field": "", "hit_end": "", "uri": "", "serial_num": "QbJK/8ze/", "rule_desc": "SilverFox远控木马活动事件", "filename": "", "proto": "dns", "rule_state": "green", "xff": "", "sport": 57989, "host_md5": "665ebcf0d4cd86772296a9fb3afef9e1", "access_time": 1732636806000}, "hit_start": "", "skyeye_id": "", "payload": {"packet_data": "ACSs3Z37AJShXm6HCABFAABIAAAAADkRlHje9oFQrB/gxgA14oUANAAAbeuBoAABAAEAAAAABmh5c3VnYwNuZXQAAAEAAcAMAAEAAQAAAAIABH8AAAE="}, "file_md5": "", "host": "hysugc.net", "host_state": "失陷", "rule_key": "host", "api": "", "first_access_time": "2024-11-27 00:00:06", "hazard_level": "7", "hazard_rating": "高危", "tproto": "udp", "packet_data": "ACSs3Z37AJShXm6HCABFAABIAAAAADkRlHje9oFQrB/gxgA14oUANAAAbeuBoAABAAEAAAAABmh5c3VnYwNuZXQAAAEAAcAMAAEAAQAAAAIABH8AAAE=", "hit_field": "", "sip_addr": "局域网", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.224.198", "rule_desc": "SilverFox远控木马活动事件", "filename": "", "skyeye_index": "", "sip_ioc_dip": "51b3dc42f3ca88b8c3ea5fffed38c826", "proto": "dns", "xff": "", "alarm_id": "20241127_99c400c8c150b86f6237e43b61dd3e02", "attack_chain": "0x03090000", "access_time": "1732636806000", "attack_addr": "", "type_chain": "14080000", "dip_addr": "中国--湖南省--长沙市", "xml_confidence": "high", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "malicious_family": "SilverFox", "update_time": "1732636803", "branch_id": "QbJK/5PW2", "file_direction": "", "att_ck": "执行:TA0002|用户执行:T1204|恶意链接:T1204.001", "sip": "172.31.224.198", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "severity": "7", "src_mac": "00:24:ac:dd:9d:fb", "file_content": "", "victim_ip": "172.31.224.198", "file_name": "", "confidence": "高", "dns_arecord": "127.0.0.1", "super_type": "恶意软件", "super_attack_chain": "0x03000000", "hit_end": "", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:94:a1:5e:6e:87", "is_delete": "0", "tcp_option": "", "rule_id": "", "attack_org": "SilverFox", "is_white": "0", "alarm_sample": "1", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "hysugc.net", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"hysugc.net\", \"answers\": [{\"type\": \"A\", \"data\": \"127.0.0.1\"}]}]}}", "host_md5": "665ebcf0d4cd86772296a9fb3afef9e1", "sport": "57989"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636806", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636806, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58091, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAADvcxFAAH4GXsSsH2IUdh+l4OLrAbvWbZ2cCzrmlFAYQHEdqwAAFgMBAMIBAAC+AwNvUUjghAHv9TRulCtKjI4B9awNXKiM48SI/JEDUnCqhAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:06", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAADvcxFAAH4GXsSsH2IUdh+l4OLrAbvWbZ2cCzrmlFAYQHEdqwAAFgMBAMIBAAC+AwNvUUjghAHv9TRulCtKjI4B9awNXKiM48SI/JEDUnCqhAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "局域网", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "5581a7fd7b777b17b8e6c4b2c07fa257", "proto": "ssl", "xff": "", "alarm_id": "20241127_760f656d1176a5f29e3a3e61e2d23eb0", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:06", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636800", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58091", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636806", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.224.198", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636806, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "172.31.224.198", "protocol_id": 17, "hit_end": 26, "uri": "", "cnnvd_id": "", "dport": 53, "rule_version": "3.0.1122.14572", "hit_start": 6, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 74, "appid": 130, "proto": "dns", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 54160, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "6", "skyeye_id": "", "payload": {"packet_data": "lAScyEuGSEb731OaCABFAAA8cw4AAH4RLomsH2IUrB/gxtOQADUAKLiQIrMBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:06", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "lAScyEuGSEb731OaCABFAAA8cw4AAH4RLomsH2IUrB/gxtOQADUAKLiQIrMBAAABAAAAAAAABXNsYXBpBG9yYXkDbmV0AAABAAE=", "hit_field": "", "sip_addr": "局域网", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "5581a7fd7b777b17b8e6c4b2c07fa257", "proto": "dns", "xff": "", "alarm_id": "20241127_760f656d1176a5f29e3a3e61e2d23eb0", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:06", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "局域网", "dport": "53", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732636800", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "48:46:fb:df:53:9a", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "26", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "94:04:9c:c8:4b:86", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "74", "alarm_sample": "1", "appid": "130", "attack_sip": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "54160", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636805", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "118.31.165.224", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636805, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "118.31.165.224", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58091, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvcxFAAHsGYcSsH2IUdh+l4OLrAbvWbZ2cCzrmlFAYQHEdqwAAFgMBAMIBAAC+AwNvUUjghAHv9TRulCtKjI4B9awNXKiM48SI/JEDUnCqhAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:05", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvcxFAAHsGYcSsH2IUdh+l4OLrAbvWbZ2cCzrmlFAYQHEdqwAAFgMBAMIBAAC+AwNvUUjghAHv9TRulCtKjI4B9awNXKiM48SI/JEDUnCqhAAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.98.20", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "b48b3eebe83078a68a8b1ceb54f99d82", "proto": "ssl", "xff": "", "alarm_id": "20241127_a807a0161f2804b0f2d69ab9558b9145", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:05", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.98.20", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58091", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636803", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636803, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 327, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 17531, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE5TPNAADsGaQKsERErL2CcLUR7AbtZptHWxGzrP1AYBAH2tQAAFgMBAQwBAAEIAwMN4o340lxgzuYUc5yydqnu2H6VdmRToLykSjIQsy813CD7qtPh8J79cjvjM7ntBav/rwAz/TkoaAE2Q9JayrQU4gAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIC2GBoBgBSnLaSolRgjSPTigLgcFDjHuAw6N7rEl1CV/"}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:03", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE5TPNAADsGaQKsERErL2CcLUR7AbtZptHWxGzrP1AYBAH2tQAAFgMBAQwBAAEIAwMN4o340lxgzuYUc5yydqnu2H6VdmRToLykSjIQsy813CD7qtPh8J79cjvjM7ntBav/rwAz/TkoaAE2Q9JayrQU4gAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACZAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAEgAAACsABQQDBAMDADMAJgAkAB0AIC2GBoBgBSnLaSolRgjSPTigLgcFDjHuAw6N7rEl1CV/", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.17.17.43", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "928bfe2f28ea05d4c3f222997cfe925d", "proto": "ssl", "xff": "", "alarm_id": "20241127_7b49d204432a5ebd3e7dc7f6691a8e9e", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:03", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.17.17.43", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "327", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "17531", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636802", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636802, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 169, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 149, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 230, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61581, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "149", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADYhRoAAHwGwlasH38CL2CcLfCNAbtUAK5BwReJ6VAYAETXMQAAFgMBAKsBAACnAwNBNxV9yXmmx3lkEJNA3tx0coKYu3chNu1e/4JwUmDHKAAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:02", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADYhRoAAHwGwlasH38CL2CcLfCNAbtUAK5BwReJ6VAYAETXMQAAFgMBAKsBAACnAwNBNxV9yXmmx3lkEJNA3tx0coKYu3chNu1e/4JwUmDHKAAAIMAvwDDAK8AszKjMqcATwAnAFMAKAJwAnQAvADXAEgAKAQAAXgAAAB4AHAAAGWFwaS1zdGQuc3VubG9naW4ub3JheS5jb20ABQAFAQAAAAAACgAKAAgAHQAXABgAGQALAAIBAAANABIAEAQBBAMFAQUDBgEGAwIBAgP/AQABAAASAAA=", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.31.127.2", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "c145971be86ec9152be37862b2043a12", "proto": "ssl", "xff": "", "alarm_id": "20241127_97b4c987ab875d8602676144070ae45f", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:02", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.31.127.2", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "169", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "230", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61581", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636801", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.98.235.31", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636801, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.98.235.31", "protocol_id": 6, "hit_end": 182, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 162, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 253, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.16.173.29", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 58524, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "162", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAADvmdpAAHoG8n6sEK0dL2LrH+ScAbv/uRAa1Kaz7VAYBAG5rwAAFgMBAMIBAAC+AwO57k08hkpNADFvgqoFNJJRxC68ghe49DKak4O5Xufy3AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:01", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAADvmdpAAHoG8n6sEK0dL2LrH+ScAbv/uRAa1Kaz7VAYBAG5rwAAFgMBAMIBAAC+AwO57k08hkpNADFvgqoFNJJRxC68ghe49DKak4O5Xufy3AAAOMAswDAAn8ypzKjMqsArwC8AnsAkwCgAa8AjwCcAZ8AKwBQAOcAJwBMAMwCdAJwAPQA8ADUALwD/AQAAXQAAABMAEQAADnNsYXBpLm9yYXkubmV0AAsABAMAAQIACgAKAAgAHQAXABkAGAAjAAAADQAgAB4GAQYCBgMFAQUCBQMEAQQCBAMDAQMCAwMCAQICAgMAFgAAABcAAA==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.16.173.29", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "796a57e66991bbf62cb03bb407c2036a", "proto": "ssl", "xff": "", "alarm_id": "20241127_9ef9c129a1f5b2a328ec4045d870c56e", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:01", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.16.173.29", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "182", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "253", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "58524", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636800", "vlan_id": "", "vuln_type": "发现使用远程连接工具向日葵", "attack_type": "代理工具", "dip_group": "省公司", "is_web_attack": "0", "nid": "", "dip": "47.96.156.45", "sip_group": "", "repeat_count": "1", "type": "代理工具", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732636800, "rule_name": "发现使用远程连接工具向日葵", "hit_field": "", "description": "1", "dip": "47.96.156.45", "protocol_id": 6, "hit_end": 207, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 187, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "packet_size": 331, "appid": 19, "proto": "ssl", "xff": "", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "sig_id": 2579, "sport": 61781, "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"}, "hit_start": "187", "skyeye_id": "", "payload": {"packet_data": "ACSsIoQzACSs3Z37CABFAAE9loVAAHwGZG6sE4smL2CcLfFVAbsnmn8Mja0MvFAYBAHItQAAFgMBARABAAEMAwNOiDlksEwoFFbPkhdzdGG+DCVuUfqqyIJzvP6Ts1n3MiCRQW7XuTyAi7ydBMmrwvVAlvdAOcZXvYgxIVv6BQyRwgAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACBJ7nCSl5/zc0Go65hI0cl7AxreiWoE+sirlGHW3id+dg=="}, "detail_info": "发现有主机在使用远程连接工具向日葵,向日葵是一款优质的远程支持、远程访问和在线协作软件。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 00:00:00", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现使用远程连接工具向日葵", "packet_data": "ACSsIoQzACSs3Z37CABFAAE9loVAAHwGZG6sE4smL2CcLfFVAbsnmn8Mja0MvFAYBAHItQAAFgMBARABAAEMAwNOiDlksEwoFFbPkhdzdGG+DCVuUfqqyIJzvP6Ts1n3MiCRQW7XuTyAi7ydBMmrwvVAlvdAOcZXvYgxIVv6BQyRwgAmwCvAL8AswDDMqcyowAnAE8AKwBQAnACdAC8ANcASAAoTARMCEwMBAACdAAAAHgAcAAAZYXBpLXN0ZC5zdW5sb2dpbi5vcmF5LmNvbQAFAAUBAAAAAAAKAAoACAAdABcAGAAZAAsAAgEAAA0AGgAYCAQEAwgHCAUIBgQBBQEGAQUDBgMCAQID/wEAAQAAFwAAABIAAAArAAUEAwQDAwAzACYAJAAdACBJ7nCSl5/zc0Go65hI0cl7AxreiWoE+sirlGHW3id+dg==", "hit_field": "", "sip_addr": "中国--湖南省--长沙市", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "alarm_sip": "172.19.139.38", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "11df88f2a661fda8f11a87e5ee1fac45", "proto": "ssl", "xff": "", "alarm_id": "20241127_2db4169ded47ee2744dbef301e578b59", "attack_chain": "0x02020000", "access_time": "2024-11-27 00:00:00", "attack_addr": "", "type_chain": "16220000", "description": "1", "dip_addr": "中国--浙江省--杭州市", "dport": "443", "alert_devip": "172.31.191.8", "rsp_status": "", "update_time": "1732636761", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.19.139.38", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/jYtc", "src_mac": "00:24:ac:dd:9d:fb", "confidence": "高", "super_type": "攻击利用", "super_attack_chain": "0x02000000", "hit_end": "207", "serial_num": "QbJK/jYtc", "uri": "", "dst_mac": "00:24:ac:22:84:33", "is_delete": "0", "tcp_option": "", "rule_id": "0x5a11", "attack_org": "", "is_white": "0", "packet_size": "331", "alarm_sample": "1", "appid": "19", "attack_sip": "", "rule_state": "green", "asset_group": "省公司", "ioc": "23057-发现使用远程连接工具向日葵", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}}", "sig_id": "2579", "host_md5": "", "sport": "61781", "bulletin": "向日葵这类远程工具的使用是危险的,可能成为黑客的后门,请严格按照公司规定使用。"} | 误报 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请按照以下格式给出回答:
<reasoning>
...
</reasoning>
<answer>
...
</answer>
<answer>标签中请直接回答"攻击"或"误报"。 | {"write_date": "1732636800", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "未分配资产组", "type": "弱口令", "password": "123456", "_origin": {"write_date": 1732636800, "vuln_harm": "弱口令容易被猜解,造成个人信息等数据丢失,严重者可导致网站被攻陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.19.3.18", "site_app": "", "hit_end": 38, "uri": "/api/sysAuth/login", "dport": 10016, "vuln_name": "发现管理员用户弱口令登录行为", "rsp_status": 200, "code_language": "", "solution": "使用具有一定复杂度的强口令。", "hit_start": 18, "detail_info": "发现管理员账户使用弱口令登录行为。", "xff": "172.31.230.50", "sip": "172.23.236.241", "vuln_desc": "发现管理员账户使用弱口令登录行为。", "public_date": "2021-09-28 18:54:24", "sport": 46002}, "detail_info": "发现管理员账户使用弱口令登录行为。", "file_md5": "", "rule_key": "webids", "connection": "close", "api": "21.57.190.110:30307/api/sysAuth/login", "first_access_time": "2024-11-27 00:00:00", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "局域网", "x-forwarded-for": "172.31.230.50", "x_forwarded_for": "172.31.230.50", "accept": "application/json;charset=UTF-8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现管理员用户弱口令登录行为", "alarm_sip": "172.19.3.18", "skyeye_index": "", "sip_ioc_dip": "904597c7a02d5d125a5f0f58395748f5", "xff": "172.31.230.50", "vuln_desc": "发现管理员账户使用弱口令登录行为。", "attack_chain": "0x02020000", "vuln_harm": "弱口令容易被猜解,造成个人信息等数据丢失,严重者可导致网站被攻陷。", "dport": "10016", "alert_devip": "172.31.191.57", "update_time": "1732636781", "code_language": "", "public_date": "2021-09-28 18:54:24", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "38", "h_proto_version": "HTTP/1.0", "uri": "/api/sysAuth/login", "dst_mac": "e0:97:96:51:6e:86", "is_delete": "0", "rule_id": "0x10020dee", "x-real-ip": "172.31.230.50", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.23.236.241", "host_md5": "334f7e5cf7b7546863163191bd4549f2", "user-agent": "Java/1.8.0_242", "vlan_id": "", "vuln_type": "发现管理员用户弱口令登录行为", "attack_type": "弱口令", "is_web_attack": "1", "dip": "172.19.3.18", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "使用具有一定复杂度的强口令。", "hit_start": "18", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYXBpL3N5c0F1dGgvbG9naW4gSFRUUC8xLjANClgtUmVhbC1JUDogMTcyLjMxLjIzMC41MA0KWC1Gb3J3YXJkZWQtRm9yOiAxNzIuMzEuMjMwLjUwDQpIb3N0OiAyMS41Ny4xOTAuMTEwOjMwMzA3DQpDb25uZWN0aW9uOiBjbG9zZQ0KQ29udGVudC1MZW5ndGg6IDM5DQpBY2NlcHQ6IGFwcGxpY2F0aW9uL2pzb247Y2hhcnNldD1VVEYtOA0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi9qc29uO2NoYXJzZXQ9VVRGLTgNClVzZXItQWdlbnQ6IEphdmEvMS44LjBfMjQyDQoNCg==", "req_body": "eyJwYXNzd29yZCI6IjEyMzQ1NiIsImFjY291bnQiOiJhZG1pbiJ9", "rsp_header": "SFRUUC8xLjEgMjAwIE9LDQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL2pzb247IGNoYXJzZXQ9dXRmLTgNCkNvbnRlbnQtTGFuZ3VhZ2U6IHpoLUNODQpTZXJ2ZXI6IE1pY3Jvc29mdC1JSVMvMTAuMA0KZW52aXJvbm1lbnQ6IFByb2R1Y3Rpb24NClgtUmF0ZS1MaW1pdC1MaW1pdDogMWQNClgtUmF0ZS1MaW1pdC1SZW1haW5pbmc6IDk5OTc2Nw0KWC1SYXRlLUxpbWl0LVJlc2V0OiAyMDI0LTExLTI2VDIzOjAwOjAwLjAyNzEzMTNaDQpYLVBvd2VyZWQtQnk6IEFTUC5ORVQNCkRhdGU6IFR1ZSwgMjYgTm92IDIwMjQgMTY6MDA6MDAgR01UDQpDb25uZWN0aW9uOiBjbG9zZQ0KDQo=", "rsp_body": "eyJjb2RlIjo1MDAsInR5cGUiOiJlcnJvciIsIm1lc3NhZ2UiOiJUaGUgaW5wdXQgaXMgbm90IGEgdmFsaWQgQmFzZS02NCBzdHJpbmcgYXMgaXQgY29udGFpbnMgYSBub24tYmFzZSA2NCBjaGFyYWN0ZXIsIG1vcmUgdGhhbiB0d28gcGFkZGluZyBjaGFyYWN0ZXJzLCBvciBhbiBpbGxlZ2FsIGNoYXJhY3RlciBhbW9uZyB0aGUgcGFkZGluZyBjaGFyYWN0ZXJzLiIsInJlc3VsdCI6bnVsbCwiZXh0cmFzIjpudWxsLCJ0aW1lIjoiMjAyNC0xMS0yNyAwMDowMDowMCJ9"}, "host": "21.57.190.110:30307", "host_state": "企图", "rsp_body": "{\"code\":500,\"type\":\"error\",\"message\":\"The input is not a valid Base-64 string as it contains a non-base 64 character, more than two padding characters, or an illegal character among the padding characters.\",\"result\":null,\"extras\":null,\"time\":\"2024-11-27 00:00:00\"}", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_9583f362da231d1b723f0cecc9035ad6", "access_time": "2024-11-27 00:00:00", "content-length": "39", "attack_addr": "局域网", "type_chain": "160E0000", "dip_addr": "局域网", "rsp_status": "200", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "content-type": "application/json;charset=UTF-8", "sip": "172.23.236.241", "dimension": "1", "url_path": "/api/sysAuth/login", "src_mac": "64:3e:8c:44:c0:e6", "file_name": "", "confidence": "中", "rsp_header": "HTTP/1.1 200 OK\r\nContent-Type: application/json; charset=utf-8\r\nContent-Language: zh-CN\r\nServer: Microsoft-IIS/10.0\r\nenvironment: Production\r\nX-Rate-Limit-Limit: 1d\r\nX-Rate-Limit-Remaining: 999767\r\nX-Rate-Limit-Reset: 2024-11-26T23:00:00.0271313Z\r\nX-Powered-By: ASP.NET\r\nDate: Tue, 26 Nov 2024 16:00:00 GMT\r\nConnection: close\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /api/sysAuth/login HTTP/1.0\r\nX-Real-IP: 172.31.230.50\r\nX-Forwarded-For: 172.31.230.50\r\nHost: 21.57.190.110:30307\r\nConnection: close\r\nContent-Length: 39\r\nAccept: application/json;charset=UTF-8\r\nContent-Type: application/json;charset=UTF-8\r\nUser-Agent: Java/1.8.0_242\r\n\r\n", "req_body": "{\"password\":\"123456\",\"account\":\"admin\"}", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570094-发现管理员用户弱口令登录行为", "rule_labels": "{\"0x100604\": {\"parent_id\": \"0x100600\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"弱口令\", \"username\": \"admin\", \"password\": \"123456\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"device\": \"Spider/Spider\", \"software\": \"Java/8.0.242\", \"hw_type\": \"PC\"}}", "sport": "46002", "h_url": "/api/sysAuth/login", "account": "admin"} | 误报 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.