Snort mailing list archives
Re: Experimental Shellcode ?
From: Chris Green <cmg () uab edu>
Date: Tue, 19 Feb 2002 15:54:23 -0600
Render-Vue <sales () render-vue com> writes:
Hi Yah, Noticed this one from version 1.8.3 logs EXPERIMENTAL SHELLCODE x86 NOOP 2 209.52.171.15 -> xxx.xxx.64.121 I've done a search on google etc but can't find an explaination. Can anyone enlighten me please
A NOOP is a computer instruction to do nothing. They are often used to pad buffer overflow exploits so typically you would look at the full packet data and find the context of the packet and find out if it was something against something neat like a rpc service or something mundane like the middle of an MP3. The rule that set it off looks like: alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"EXPERIMENTAL SHELLCODE x86 NOOP"; content:"|61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61|"; classtype:shellcode-detect; sid:1394; rev:1;) -- Chris Green <cmg () uab edu> A good pun is its own reword. _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Experimental Shellcode ? Render-Vue (Feb 19)
- Re: Experimental Shellcode ? Chris Green (Feb 19)
- Re: Experimental Shellcode ? Render-Vue (Feb 19)
- Re: Experimental Shellcode ? Chris Green (Feb 19)
