Skip to content

Commit 01c2025

Browse files
committed
adding pornography detection rule
1 parent 7af962a commit 01c2025

File tree

3 files changed

+41
-0
lines changed

3 files changed

+41
-0
lines changed

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -1 +1,2 @@
11
.DS_Store
2+
.idea

devcontainer.json

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
{
2+
"name": "UTMStack Rules v10",
3+
"image": "golang:latest",
4+
"features": {
5+
"ghcr.io/devcontainers/features/docker-in-docker:2.12.0": {}
6+
},
7+
"customizations": {
8+
"vscode": {
9+
"extensions": [
10+
"golang.go"
11+
]
12+
}
13+
},
14+
"postCreateCommand": "go mod tidy"
15+
}

fortinet/fortigate/porn.yml

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
- name: "Pornography Site Access Detection"
2+
severity: "Medium"
3+
description: "This alert is triggered when a pornography site access has been detected by the firewall."
4+
solution: "Investigate the source host for possible malicious behavior."
5+
category: "Social Engineering"
6+
tactic: "Manipulate Human Behavior"
7+
dataTypes: ["firewall-fortigate-traffic"]
8+
reference:
9+
- "https://capec.mitre.org/data/definitions/416.html"
10+
frequency: 60
11+
cache:
12+
- allOf:
13+
- field: "logx.fortigate.catdesc"
14+
operator: "=="
15+
value: "Pornography"
16+
- field: "logx.fortigate.eventtype"
17+
operator: "=="
18+
value: "dns-response"
19+
minCount: 1
20+
timeLapse: 300
21+
save:
22+
- field: "logx.fortigate.src_ip"
23+
alias: "SourceIP"
24+
- field: "logx.fortigate.qname"
25+
alias: "DestinationHost"

0 commit comments

Comments
 (0)