Snort mailing list archives
Re: Re: [Snort-devel] classification changes
From: Mike Johnson <mike () enoch org>
Date: Wed, 23 May 2001 10:54:24 -0400
Chris Green [cmg () uab edu] wrote:
Brian Caswell <bmc () mitre org> writes:We are going to change the classification for the Snort.org ruleset. Sorry IDWG guys, your classifications. The IDWG classifications are just not viable. I tried. Its really bad.Yes for right now, a good bit of the priorities aren't worth watching. This is partially due to weird classicfactions like "bad-unknown" and partially tdue to snort not having a to easily differentiate between an attempted- and a successful-
I'm actually quite happy with the current priorities. I simply filter out the first three (not-suspicious, unknown, bad-unknown). I like that they're there, though, in case I want to have a better view of my network. In the end, I'll cope. I always knew using code from CVS was subject to change.
To do this, nearly a whole set of rules that operate only on stuff once tagged seems to be to separate the CMD.EXE 200's from the CMD.EXE 404s or whatever.
There's already some rules that have successful- tags. I think I only noticed one or two that weren't DDoS related (like zombie to handler comminucations), though. But separating the CMD.EXE's like you mention could bequite useful.
Atleast keep the same order that was already defined where larger numerical magnitude means higher priority.
Consider this a 'me too' vote. Both methods have their disadvantages when it comes to adding new priorities (you can't insert a new rule with a discrete (no other rules with this priority) priority of 2 into either without renumbering most all of them. But I'm quite used to a higher number meaning a higher priority.
I don't think url-access/exploit are any different than attempted-user in the large scheme of things.
Agreed. Exploiting a cgi grants user access at best, or on IIS boxes it grants admin.
service-probe for like a bind.version
Currently attempted-recon. At the very least, I like the service-probe name better as it's a bit more descriptive as to what's going on. But what about probes for listening trojans and looking for zombies?
attempted-admin for an root exploit
Certainly.
attempted-user for an exploit that will give you nobody privledges
Or whatever user your daemon runs as. Mike -- If at first you don't succeed, destroy all evidence that you tried -- unknown _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: http://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- classification changes Brian Caswell (May 22)
- Re: [Snort-devel] classification changes Chris Green (May 23)
- Re: [Snort-devel] classification changes Brian Caswell (May 23)
- Re: [Snort-devel] classification changes Chris Green (May 23)
- Re: Re: [Snort-devel] classification changes Mike Johnson (May 23)
- Re: [Snort-devel] classification changes Brian Caswell (May 23)
- Re: classification changes Max Vision (May 23)
- Re: [Snort-devel] classification changes Joe McAlerney (May 23)
- Re: [Snort-devel] classification changes Chris Green (May 23)
