You can subscribe to this list here.
2003 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
(15) |
Jun
(23) |
Jul
(54) |
Aug
(20) |
Sep
(18) |
Oct
(19) |
Nov
(36) |
Dec
(30) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2004 |
Jan
(48) |
Feb
(16) |
Mar
(36) |
Apr
(36) |
May
(45) |
Jun
(47) |
Jul
(93) |
Aug
(29) |
Sep
(28) |
Oct
(42) |
Nov
(45) |
Dec
(53) |
2005 |
Jan
(62) |
Feb
(51) |
Mar
(65) |
Apr
(28) |
May
(57) |
Jun
(23) |
Jul
(24) |
Aug
(72) |
Sep
(16) |
Oct
(53) |
Nov
(53) |
Dec
(3) |
2006 |
Jan
(56) |
Feb
(6) |
Mar
(15) |
Apr
(14) |
May
(35) |
Jun
(57) |
Jul
(35) |
Aug
(7) |
Sep
(22) |
Oct
(16) |
Nov
(18) |
Dec
(9) |
2007 |
Jan
(8) |
Feb
(3) |
Mar
(11) |
Apr
(35) |
May
(6) |
Jun
(10) |
Jul
(26) |
Aug
(4) |
Sep
|
Oct
(29) |
Nov
|
Dec
(7) |
2008 |
Jan
(1) |
Feb
(2) |
Mar
(2) |
Apr
(13) |
May
(8) |
Jun
(3) |
Jul
(19) |
Aug
(20) |
Sep
(6) |
Oct
(5) |
Nov
|
Dec
(4) |
2009 |
Jan
(1) |
Feb
|
Mar
(1) |
Apr
|
May
|
Jun
(10) |
Jul
(2) |
Aug
(5) |
Sep
|
Oct
(1) |
Nov
|
Dec
(5) |
2010 |
Jan
(10) |
Feb
(10) |
Mar
(2) |
Apr
|
May
(7) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
|
2011 |
Jan
|
Feb
(4) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2013 |
Jan
|
Feb
(2) |
Mar
(3) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: <DAN...@ao...> - 2003-05-18 21:49:10
|
Hello, I am trying to find out if it is possible to run snort-inline on a freebsd box? And if so how would you configure ipfw to forward traffic to snort-inline? I have looked on some other mailing lists which seem to mention that it is possible, but not how to go about doing it. Thanks Danny |
From: Ray S. <me...@hi...> - 2003-05-18 18:28:24
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Forescout ( http://www.forescout.com/index.html) sells a product that works with commercial firewall and IPS vendors. It detects all kinds of scans and returns dummy server information. Then any traffic to these dummy servers can be filtered. You can replace the dummy server addresses with your honeypot(s). I agree this would be a great feature to snort and I have copied the snort-inline list. Best regards ray On Friday 16 May 2003 02:48 pm, Jon Baer wrote: > It would be nice to have an intelligent version of Snort to be able to do > this :-) Im also interested in an answer, if you get it please pass along. > Thanks. > > - Jon > > ----- Original Message ----- > From: "Andrew Elmore" <and...@cy...> > To: <sec...@se...> > Sent: Friday, May 16, 2003 7:38 AM > Subject: attack redirection > > > Hey guys, > I'm looking for some program to redirect an attack on my web server > to a honeypot. Maybe triggered by number of hits in a given time or by > certain requests. Does such a thing exist? Where can I get it? Or would I > have to write some kind of script? > Thanks for your help. > > Andy > > > --------------------------------------------------------------------------- > Thinking About Security Training? You Can't Afford Not To! > > Vigilar's industry leading curriculum includes: Security +, Check Point, > Hacking & Assessment, Cisco Security, Wireless Security & more! Register > Now! > --UP TO 30% off classes in select cities-- > http://www.securityfocus.com/Vigilar-security-basics > --------------------------------------------------------------------------- >- > > > > --------------------------------------------------------------------------- > Thinking About Security Training? You Can't Afford Not To! > > Vigilar's industry leading curriculum includes: Security +, Check Point, > Hacking & Assessment, Cisco Security, Wireless Security & more! Register > Now! --UP TO 30% off classes in select cities-- > http://www.securityfocus.com/Vigilar-security-basics > --------------------------------------------------------------------------- >- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+x9DGzejBliQ3SdsRAtjzAKDugolpgwe8l44CH0tfnE3YURjS/QCfQEyl Kdg7j0zoQ6Z0Z3WhNWezH5M= =UOcy -----END PGP SIGNATURE----- |
From: Lance S. <la...@ho...> - 2003-05-16 14:33:31
|
On Tue, 13 May 2003 rob...@di... wrote: > I am in the process of setting up a demo honeynet, and am installing and > using the snort_inline/GenII configuration for the first time. > > I was wondering if anyone would share the hardware configuration of their > gateway PC with me - just how much processor power and memory is required to > front end a small (max 4 honeypots) honeynet? Minimal. You can easily get away with an old Pentium and 64 MB of RAM. Remember, Honeynets in general only collect malicious or unauthorized traffic, so you should see no more then 5 MB of traffic a day (unless you are compromised, then the captured activity definitely increases). The biggest challenge will be getting your system to work with several NICs. Also, any Linux distribution should work fine. If anyone has different findings, I would definitely be interested in their experiences. lance |
From: <rob...@di...> - 2003-05-15 20:59:41
|
Hello -- I am in the process of setting up a demo honeynet, and am installing and using the snort_inline/GenII configuration for the first time. I was wondering if anyone would share the hardware configuration of their gateway PC with me - just how much processor power and memory is required to front end a small (max 4 honeypots) honeynet? As well, most of the documentation I've found cites people as using Redhat Linux 7.3. Has anyone used versions 8 or 9 - any "gotchas" to report? Any and all responses will be appreciated. I will summarize what I receive and post back to the list. Cheers, Robb |
From: Rob M. <rv...@ca...> - 2003-05-06 22:50:00
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tue, 6 May 2003, danh wrote: > Hi people, > > I am using snort_inline 2.0.0 and it all appears to be functioning > normally (I have iptables set up with the "-j QUEUE" target for all > incoming traffic on port 80, without snort_inline running I get no > connections, with it running my web server sees the requests) but after > extensive testing I can confirm that it is letting through sequences > that "normal" snort will alert on. Can you give some examples of the sequences that are getting through? What rules are you using? As far as the behavior with the QUEUE and no snort_inline running, it is ip_queue's default behavior to drop packets if no process (snort_inline in our case) is not listening to the queue. Also, please download the latest snort_inline-2.0.0-1. > There are a few things that I have noticed that may have a bearing. > > When I used to run normal snort, I started it with the "-i ppp0" command > line option, as that is my external interface. I also had the line "var > HOME_NET [10.0.0.0/8,$ppp0_ADDRESS]" in my conf file. This does not > appear to work for snort_inline. I get an error about undefined variables. snort_inline does not get its packets from an interface therefore, the -i flag will not do much good. Instead, snort_inline gets its packet from the firewall. So if you want to control where snort_inline gets its packets, you have to divert them with the use of -j QUEUE. For example, if I want all of my inbound packets to tcp port 80 on my ppp0 interface to go through snort_inline, I would use the following iptables rule: iptables -A INPUT -i ppp0 -p tcp --dport 80 -m state --state NEW,RELATED,ESTABLISHED -j QUEUE Use connection tracking (state) because it makes iptables reassemble all fragments before it passes them on. > Also when I start up normal snort, during initialisation it reports 1331 > rules active etc.. However, snort_inline says 0 rules activated BUT it > does appear to be applying rules (it caught a WEB-IIS cmd.exe attack). hmm. I don't get the same results. [root@Jiggy src]# ./snort_inline -Qc /etc/snort_inline/snort_inline.new.conf Reading from iptables Running in IDS mode Log directory = /var/log/snort Initializing Inline mode --== Initializing Snort ==-- Initializing Output Plugins! Setting the Packet Processor to decode packets from iptables Initializing Preprocessors! Initializing Plug-ins! Parsing Rules file /etc/snort_inline/snort_inline.new.conf +++++++++++++++++++++++++++++++++++++++++++++++++++ Initializing rule chains... http_decode arguments: Unicode decoding IIS alternate Unicode decoding IIS double encoding vuln Flip backslash to slash Include additional whitespace separators Ports to decode http on: 80 rpc_decode arguments: Ports to decode RPC on: 111 32771 alert_fragments: INACTIVE alert_large_fragments: ACTIVE alert_incomplete: ACTIVE alert_multiple_requests: ACTIVE telnet_decode arguments: Ports to decode telnet on: 21 23 25 119 Conversation Config: KeepStats: 0 Conv Count: 32000 Timeout : 60 Alert Odd?: 0 Allowed IP Protocols: All 1369 Snort rules read... 1369 Option Chains linked into 113 Chain Headers 0 Dynamic rules +++++++++++++++++++++++++++++++++++++++++++++++++++ Rule application order: - ->activation->dynamic->drop->sdrop->reject->alert->pass->log --== Initialization Complete ==-- ******************* snort_inline-2.0.0-1 ******************* a modification of ... - -*> Snort! <*- Version 2.0.0 (Build 72) By Martin Roesch (ro...@so..., www.snort.org) > The reason I am using snort_inline is that I am trying to get a true > count of web site hits, but I am getting so many "code red" attempts it > is distorting the figures. So I was trying to drop the connections > before they even get to the web server. I know that there are issues > with detecting code red attacks (no established flag etc) but I can > handle that. Cool! and thanks for the feedback. Rob -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 Comment: Made with pgp4pine 1.76 iQA/AwUBPrg76/nAyY+9KLjdEQKg0QCgmB/HVkyY8MQ97KvvrHVuGbsqbrIAnipc MOz0JB2jIP91svUjKZ9nnTis =Jg53 -----END PGP SIGNATURE----- |
From: danh <da...@li...> - 2003-05-06 11:15:11
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi people, I am using snort_inline 2.0.0 and it all appears to be functioning normally (I have iptables set up with the "-j QUEUE" target for all incoming traffic on port 80, without snort_inline running I get no connections, with it running my web server sees the requests) but after extensive testing I can confirm that it is letting through sequences that "normal" snort will alert on. There are a few things that I have noticed that may have a bearing. When I used to run normal snort, I started it with the "-i ppp0" command line option, as that is my external interface. I also had the line "var HOME_NET [10.0.0.0/8,$ppp0_ADDRESS]" in my conf file. This does not appear to work for snort_inline. I get an error about undefined variables. Also when I start up normal snort, during initialisation it reports 1331 rules active etc.. However, snort_inline says 0 rules activated BUT it does appear to be applying rules (it caught a WEB-IIS cmd.exe attack). The reason I am using snort_inline is that I am trying to get a true count of web site hits, but I am getting so many "code red" attempts it is distorting the figures. So I was trying to drop the connections before they even get to the web server. I know that there are issues with detecting code red attacks (no established flag etc) but I can handle that. Any advice would be cool. Cheers Dan Hennessey -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE+t5hEUGFfCkMKT4ERAlJLAJ9M1ebZ5ne29yTDPNoev+W5oq70wwCgiZWu U9xK7AWqL6S2LDExVrmXsoA= =AJSh -----END PGP SIGNATURE----- |
From: Fabian B. <fab...@we...> - 2003-05-06 09:26:29
|
On Mon, May 05, 2003 at 08:15:37PM -0400, Rob McMillen wrote: > Anyone using snort_inline? Just wondering if anyone is having problems= =20 > using it. Im using it in my honeynet. Works fine, Fabian --=20 BOFH excuse #309: firewall needs cooling |
From: Rob M. <rv...@ca...> - 2003-05-06 00:21:13
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Anyone using snort_inline? Just wondering if anyone is having problems using it. Thanks in advance, Rob -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 Comment: Made with pgp4pine 1.76 iQA/AwUBPrb+rPnAyY+9KLjdEQJVUgCgnA6M2yuwjjsJQey8ahNVPkGG3TcAnidU oU80tIurbUe/1iMP07MWhUZ9 =agQu -----END PGP SIGNATURE----- |
From: Rob M. <rv...@ca...> - 2003-05-02 03:05:43
|
A new release is out. Lance Spitzner identified a problem with the replace keyword. It was replacing the content found with zeroes instead of the specified content. The new release (snort_inline-2.0.0-1) is available at: sno...@so... Rob |
From: Rob M. <rv...@ca...> - 2003-04-27 03:49:28
|
subscribe |