Detectionlowtest
Cisco LDP Authentication Failures
Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Ciscoldp
ProductCisco← raw: cisco
Serviceldp← raw: ldp
Definition
Requirements: cisco ldp logs need to be enabled and ingested
Detection Logic
Detection Logic2 selectors
detection:
selection_protocol:
- 'LDP'
selection_keywords:
- 'SOCKET_TCP_PACKET_MD5_AUTHEN_FAIL'
- 'TCPMD5AuthenFail'
condition: selection_protocol and selection_keywordsFalse Positives
Unlikely. Except due to misconfigurations
References
MITRE ATT&CK
Rule Metadata
Rule ID
50e606bf-04ce-4ca7-9d54-3449494bbd4b
Status
test
Level
low
Type
Detection
Created
Mon Jan 09
Author
Path
rules/network/cisco/ldp/cisco_ldp_md5_auth_failed.yml
Raw Tags
attack.initial-accessattack.persistenceattack.privilege-escalationattack.defense-evasionattack.credential-accessattack.collectionattack.t1078attack.t1110attack.t1557