secubox-openwrt/package/secubox/secubox-auth-logger/files/openwrt-luci-bf.yaml
CyberMind-FR c2ea22bcab fix: CAPI registration with stale credentials cleanup
- repair_lapi() now removes stale online_api_credentials.yaml and retries
- New repair_capi() function for dedicated CAPI repair
- console_enroll() handles CAPI credential cleanup before retry
- Added repairCapi API method in frontend
- Bump luci-app-crowdsec-dashboard to 0.7.0-r20
- Add openwrt-luci-bf.yaml scenario for LuCI brute force detection
- Add secubox-auth-acquis.yaml acquisition config

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-13 11:16:58 +01:00

19 lines
509 B
YAML

# CrowdSec Scenario for SecuBox LuCI Brute Force Detection
# Triggers when multiple authentication failures are detected from the same IP
# Works with secubox/openwrt-luci-auth parser
type: leaky
name: secubox/openwrt-luci-bf
description: "Detect LuCI/OpenWrt web interface brute force attempts"
filter: "evt.Meta.log_type == 'auth_failure'"
leakspeed: "10s"
capacity: 5
groupby: evt.Meta.source_ip
blackhole: 1m
reprocess: true
labels:
service: http
remediation: true
type: bruteforce
confidence: 3