mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 22:58:20 +00:00
125 lines
4.7 KiB
Text
125 lines
4.7 KiB
Text
# @TEST-EXEC: zeek local-`cat $DIST/VERSION | sed 's/\([0-9].[0-9]\).*/\1/g'`.zeek
|
|
|
|
# This tests the compatibility of the past release's site/local.zeek
|
|
# script with the current version of Zeek.
|
|
#
|
|
# If the test fails because it doesn't find the right file (e.g. you just
|
|
# made a release), that just means you should replace the contents of this
|
|
# test with the contents of site/local.zeek from the last release. Use
|
|
# a new local-X.Y.zeek name just so this test is forced to be periodically
|
|
# refreshed with the new contents of local.zeek after every release.
|
|
#
|
|
# If the test fails while loading the old local-X.Y.zeek, it usually
|
|
# indicates a note will need to be made in NEWS explaining to users
|
|
# how to migrate to the new version. After adding that note to NEWS,
|
|
# # simply update this test's TEST-START-FILE with the latest contents
|
|
# site/local.zeek.
|
|
|
|
# @TEST-START-FILE local-8.0.zeek
|
|
##! Local site policy. Customize as appropriate.
|
|
##!
|
|
##! This file will not be overwritten when upgrading or reinstalling!
|
|
|
|
# Installation-wide salt value that is used in some digest hashes, e.g., for
|
|
# the creation of file IDs. Please change this to a hard to guess value.
|
|
redef digest_salt = "Please change this value.";
|
|
|
|
# This script logs which scripts were loaded during each run.
|
|
@load misc/loaded-scripts
|
|
|
|
# Estimate and log capture loss.
|
|
@load misc/capture-loss
|
|
|
|
# Enable logging of memory, packet and lag statistics.
|
|
@load misc/stats
|
|
|
|
# Load the scan detection script. It's disabled by default because
|
|
# it often causes performance issues.
|
|
#@load misc/scan
|
|
|
|
# Detect traceroute being run on the network. This could possibly cause
|
|
# performance trouble when there are a lot of traceroutes on your network.
|
|
# Enable cautiously.
|
|
#@load misc/detect-traceroute
|
|
|
|
# Generate notices when vulnerable versions of software are discovered.
|
|
# The default is to only monitor software found in the address space defined
|
|
# as "local". Refer to the software framework's documentation for more
|
|
# information.
|
|
@load frameworks/software/vulnerable
|
|
|
|
# Detect software changing (e.g. attacker installing hacked SSHD).
|
|
@load frameworks/software/version-changes
|
|
|
|
# This adds signatures to detect cleartext forward and reverse windows shells.
|
|
@load-sigs frameworks/signatures/detect-windows-shells
|
|
|
|
# Load all of the scripts that detect software in various protocols.
|
|
@load protocols/ftp/software
|
|
@load protocols/smtp/software
|
|
@load protocols/ssh/software
|
|
@load protocols/http/software
|
|
# The detect-webapps script could possibly cause performance trouble when
|
|
# running on live traffic. Enable it cautiously.
|
|
#@load protocols/http/detect-webapps
|
|
|
|
# This script detects DNS results pointing toward your Site::local_nets
|
|
# where the name is not part of your local DNS zone and is being hosted
|
|
# externally. Requires that the Site::local_zones variable is defined.
|
|
@load protocols/dns/detect-external-names
|
|
|
|
# Script to detect various activity in FTP sessions.
|
|
@load protocols/ftp/detect
|
|
|
|
# Scripts that do asset tracking.
|
|
@load protocols/conn/known-hosts
|
|
@load protocols/conn/known-services
|
|
@load protocols/ssl/known-certs
|
|
|
|
# This script enables SSL/TLS certificate validation.
|
|
@load protocols/ssl/validate-certs
|
|
|
|
# This script prevents the logging of SSL CA certificates in x509.log
|
|
@load protocols/ssl/log-hostcerts-only
|
|
|
|
# Uncomment the following line to check each SSL certificate hash against the ICSI
|
|
# certificate notary service; see http://notary.icsi.berkeley.edu .
|
|
# @load protocols/ssl/notary
|
|
|
|
# If you have GeoIP support built in, do some geographic detections and
|
|
# logging for SSH traffic.
|
|
@load protocols/ssh/geo-data
|
|
# Detect hosts doing SSH bruteforce attacks.
|
|
@load protocols/ssh/detect-bruteforcing
|
|
# Detect logins using "interesting" hostnames.
|
|
@load protocols/ssh/interesting-hostnames
|
|
|
|
# Detect SQL injection attacks.
|
|
@load protocols/http/detect-sqli
|
|
|
|
#### Network File Handling ####
|
|
|
|
# Enable MD5 and SHA1 hashing for all files.
|
|
@load frameworks/files/hash-all-files
|
|
|
|
# Detect SHA1 sums in Team Cymru's Malware Hash Registry.
|
|
@load frameworks/files/detect-MHR
|
|
|
|
# Extend email alerting to include hostnames
|
|
@load policy/frameworks/notice/extend-email/hostnames
|
|
|
|
# Uncomment the following line to enable detection of the heartbleed attack. Enabling
|
|
# this might impact performance a bit.
|
|
# @load policy/protocols/ssl/heartbleed
|
|
|
|
# Uncomment the following line to enable logging of connection VLANs. Enabling
|
|
# this adds two VLAN fields to the conn.log file.
|
|
# @load policy/protocols/conn/vlan-logging
|
|
|
|
# Uncomment the following line to enable logging of link-layer addresses. Enabling
|
|
# this adds the link-layer address for each connection endpoint to the conn.log file.
|
|
# @load policy/protocols/conn/mac-logging
|
|
|
|
# Uncomment this to source zkg's package state
|
|
# @load packages
|
|
# @TEST-END-FILE
|