Snort mailing list archives
Re: Snort-sigs Digest, Vol 100, Issue 8
From: Tarzan538 NONO <sfalaptops () hotmail com>
Date: Wed, 24 Sep 2014 13:17:40 -0400
Hi Simon, Here is my classification file; # $Id: classification.config,v 1.5 2013/05/28 16:19:02 jesler Exp $# The following includes information for prioritizing rules# # Each classification includes a shortname, a description, and a default# priority for that classification.## This allows alerts to be classified and prioritized. You can specify# what priority each classification has. Any rule can override the default# priority for that rule.## Here are a few example rules:# # alert TCP any any -> any 80 (msg: "EXPLOIT ntpdx overflow"; # dsize: > 128; classtype:attempted-admin; priority:10;## alert TCP any any -> any 25 (msg:"SMTP expn root"; flags:A+; \# content:"expn root"; nocase; classtype:attempted-recon;)## The first rule will set its type to "attempted-admin" and override # the default priority for that type to 10.## The second rule set its type to "attempted-recon" and set its# priority to the default for that type.# ## config classification:shortname,short description,priority# config classification: not-suspicious,Not Suspicious Traffic,3config classification: unknown,Unknown Traffic,3config classification: bad-unknown,Potentially Bad Traffic, 2config classification: attempted-recon,Attempted Information Leak,2config classification: successful-recon-limited,Information Leak,2config classification: successful-recon-largescale,Large Scale Information Leak,2config classification: attempted-dos,Attempted Denial of Service,2config classification: successful-dos,Denial of Service,2config classification: attempted-user,Attempted User Privilege Gain,1config classification: unsuccessful-user,Unsuccessful User Privilege Gain,1config classification: successful-user,Successful User Privilege Gain,1config classification: attempted-admin,Attempted Administrator Privilege Gain,1config classification: successful-admin,Successful Administrator Privilege Gain,1 # NEW CLASSIFICATIONSconfig classification: rpc-portmap-decode,Decode of an RPC Query,2config classification: shellcode-detect,Executable Code was Detected,1config classification: string-detect,A Suspicious String was Detected,3config classification: suspicious-filename-detect,A Suspicious Filename was Detected,2config classification: suspicious-login,An Attempted Login Using a Suspicious Username was Detected,2config classification: system-call-detect,A System Call was Detected,2config classification: tcp-connection,A TCP Connection was Detected,4config classification: trojan-activity,A Network Trojan was Detected, 1config classification: unusual-client-port-connection,A Client was Using an Unusual Port,2config classification: network-scan,Detection of a Network Scan,3config classification: denial-of-service,Detection of a Denial of Service Attack,2config classification: non-standard-protocol,Detection of a Non-Standard Protocol or Event,2config classification: protocol-command-decode,Generic Protocol Command Decode,3config classification: web-application-activity,Access to a Potentially Vulnerable Web Application,2config classification: web-application-attack,Web Application Attack,1config classification: misc-activity,Misc activity,3config classification: misc-attack,Misc Attack,2config classification: icmp-event,Generic ICMP event,3config classification: inappropriate-content,Inappropriate Content was Detected,1config classification: policy-violation,Potential Corporate Privacy Violation,1config classification: default-login-attempt,Attempt to Login By a Default Username and Password,2config classification: sdf,Sensitive Data was Transmitted Across the Network,2config classification: file-format,Known malicious file or file based exploit,1config classification: malware-cnc,Known malware command and control traffic,1config classification: client-side-exploit,Known client side exploit attempt,1 Here is my snort.config (Step #6). #################################################### Step #6: Configure output plugins# For more information, see Snort Manual, Configuring Snort - Output Modules################################################### # unified2 # Recommended for most installs# output unified2: filename merged.log, limit 128, nostamp, mpls_event_types, vlan_event_types # Additional configuration for specific types of installs# output alert_unified2: filename snort.alert, limit 128, nostamp# output log_unified2: filename snort.log, limit 128, nostamp # syslog# output alert_syslog: LOG_AUTH LOG_ALERT # pcap# output log_tcpdump: tcpdump.log # metadata reference data. do not modify these linesinclude C:\Snort\etc\classification.configinclude C:\Snort\etc\reference.config Thank you, Felix
Message: 2
Date: Wed, 24 Sep 2014 09:51:14 +0100
From: "Simon Wesseldine" <simon.wesseldine () idappcom com>
Subject: Re: [Snort-sigs] Snort Rules Issues
To: <snort-sigs () lists sourceforge net>
Message-ID: <000601cfd7d4$b37d5dd0$1a781970$@wesseldine () idappcom com>
Content-Type: text/plain; charset="us-ascii"
Hi Felix,
You should have the following line, in step 6 of your snort.conf file:
include classification.config
There should be a line in your classification.config file that looks like
this:
config classification: web-application-attack,Web Application Attack,1
You may have an outdated classifiction.config file that does not include all
the new classifications.
# NEW CLASSIFICATIONS
config classification: rpc-portmap-decode,Decode of an RPC Query,2
config classification: shellcode-detect,Executable Code was Detected,1
config classification: string-detect,A Suspicious String was Detected,3
config classification: suspicious-filename-detect,A Suspicious Filename was
Detected,2
config classification: suspicious-login,An Attempted Login Using a
Suspicious Username was Detected,2
config classification: system-call-detect,A System Call was Detected,2
config classification: tcp-connection,A TCP Connection was Detected,4
config classification: trojan-activity,A Network Trojan was Detected, 1
config classification: unusual-client-port-connection,A Client was Using an
Unusual Port,2
config classification: network-scan,Detection of a Network Scan,3
config classification: denial-of-service,Detection of a Denial of Service
Attack,2
config classification: non-standard-protocol,Detection of a Non-Standard
Protocol or Event,2
config classification: protocol-command-decode,Generic Protocol Command
Decode,3
config classification: web-application-activity,Access to a Potentially
Vulnerable Web Application,2
config classification: web-application-attack,Web Application Attack,1
config classification: misc-activity,Misc activity,3
config classification: misc-attack,Misc Attack,2
config classification: icmp-event,Generic ICMP event,3
config classification: inappropriate-content,Inappropriate Content was
Detected,1
config classification: policy-violation,Potential Corporate Privacy
Violation,1
config classification: default-login-attempt,Attempt to Login By a Default
Username and Password,2
config classification: sdf,Sensitive Data was Transmitted Across the
Network,2
config classification: file-format,Known malicious file or file based
exploit,1
config classification: malware-cnc,Known malware command and control
traffic,1
config classification: client-side-exploit,Known client side exploit
attempt,1
I hope that helps.
Best regards,
Simon.
-------------- next part --------------
An HTML attachment was scrubbed...
------------------------------
Message: 3
Date: Wed, 24 Sep 2014 08:37:34 -0400
From: Joe Gedeon <joe.gedeon () gmail com>
Subject: [Snort-sigs] SID 31968 EXPLOIT-KIT Astrum exploit kit Adobe
Flash exploit payload request
To: snort-sigs () lists sourceforge net
Message-ID:
<CAM1A6KxG4WYMjxc-MpWX4iR-agi_uqhkqrv1QZ=iEvatybQxgA () mail gmail com>
Content-Type: text/plain; charset="utf-8"
With this new signature we are getting quite a few false positives for this
signature. Looking at the documentation linked in the signature it seems
the section about not having a referrer was common in these. Is there
documentation that shows a recent version of the Astrum exploit kit is now
accepting requests with referrers in the header?
"with Astrum : show a referer and you'll get ignored and IP banned.
Firefox, Chrome and Opera are also ignored"
It seems this rule is completely missing the exploit attempt and is
creating a high number of false positives.
A sample ascii packet that the rule is triggering on:
07:27:43.175856 IP (tos 0x0, ttl 127, id 19122, offset 0, flags [DF], proto
TCP (6), length 1052)
192.168.1.28.58269 > 162.208.20.163.80: Flags [P.], cksum 0x617e
(correct), seq 4175168287:4175169299, ack 3935329242, win 65280, length 1012
E...J.@................P......[.P...a~..GET
/v1/epix/6835069/3845993/81088/122369/PbqfCmHAMhCcRUIqqIAAE8wAAB3gEAOq9pAAAAAAAxr2GnBMbwAQ/event.imp/r_64.aHR0cDovL2Iuc2NvcmVjYXJkcmVzZWFyY2guY29tL3A_JmMxPTgmYzI9NjAwMDAwNiZjMz04MTA4OCZjND0zODQ1OTkzJmM1PTE4OTI3JmM2PTY4MzUwNjkmYzEwPTEyMjM2OSZjdj0xLjcmY2o9MSZybj0xNDExNTU4MDI0JnI9aHR0cCUzQSUyRiUyRnBpeGVsLnF1YW50c2VydmUuY29tJTJGcGl4ZWwlMkZwLWNiNkMwekZGN2RXakkuZ2lmJTNGbGFiZWxzJTNEcC42ODM1MDY5LjM4NDU5OTMuMCUyQ2EuMTg5MjcuODEwODguMTIyMzY5JTJDdS45NjguNjQweDM2MCUzQm1lZGlhJTNEYWQlM0JyJTNEMTQxMTU1ODAyNA/cnbd.
HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer:
http://aka.spotxcdn.com/[[IMPORT]]/shim.btrll.com/shim/20140918.77768_master/Scout.swf?type=r&config_url_64=&hidefb=true&cx=&t=33&d=300x250&
x-flash-version: 11,8,800,175
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64;
Trident/5.0;)
Host: brxserv-20.btrll.com
Connection: Keep-Alive
Cookie: BR_APS=3VCKma0IBTLsBp5UnPw; DRN1=AGQclFQlufQ;
MEB=BUqRdAABPPEAOtI8AAHejA
--
Registered Linux User # 379282
-------------- next part --------------
An HTML attachment was scrubbed...
------------------------------
------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
------------------------------
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org
Please visit http://blog.snort.org for the latest news about Snort!
End of Snort-sigs Digest, Vol 100, Issue 8
******************************************
------------------------------------------------------------------------------ Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Re: Snort-sigs Digest, Vol 100, Issue 8 Tarzan538 NONO (Sep 24)
