<div dir="ltr"><div>Generally wondering why the default config ignores port 80, is that a major impact to performance?<br><br></div><br></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, Nov 26, 2013 at 10:57 PM, James Harrison <span dir="ltr"><<a href="mailto:jharr139@jhu.edu" target="_blank">jharr139@jhu.edu</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Here is some more information:<br>
<div class="im"><br>
Which reverse shell attack is it?<br>
</div> - gh0stRAT<br>
- wce<br>
- poison ivy<br>
<div class="im">Is there a rule for that type of attack being loaded when Suri starts?<br>
</div> - not that we can find specifically, but we uncommented all of the rules<br>
that should pertain.<br>
<div class="im">Are all your networks configured correctly? (HOME EXTERNAL)<br>
</div> - yes<br>
<div class="im">How do you mean "Suricata saw" the PDF transfer? Did you save it to<br>
disk with file extraction?<br>
</div> - the http.log recorded the http session retrieving the file from an<br>
'attacker' web server<br>
<div class="im">What/which rule set do you load with Suricata?<br>
</div> - emerging from 19 October<br>
<br>
PCAP output of a successful download and reverse shell can be found at<br>
<a href="https://drive.google.com/folderview?id=0B2bABk25EpPRZHktMHphbkVVajA&usp=sharing" target="_blank">https://drive.google.com/folderview?id=0B2bABk25EpPRZHktMHphbkVVajA&usp=sharing</a><br>
________________________________________<br>
From: Peter Manev <<a href="mailto:petermanev@gmail.com">petermanev@gmail.com</a>><br>
Sent: Monday, November 25, 2013 4:00 AM<br>
To: James Harrison<br>
Cc: <a href="mailto:oisf-users@lists.openinfosecfoundation.org">oisf-users@lists.openinfosecfoundation.org</a><br>
Subject: Re: [Oisf-users] Suricata: fail to detect reverse shell?<br>
<div class="HOEnZb"><div class="h5"><br>
On Mon, Nov 25, 2013 at 4:01 AM, James Harrison <<a href="mailto:jharr139@jhu.edu">jharr139@jhu.edu</a>> wrote:<br>
> Hello,<br>
><br>
> My class team recently setup the Suricata IDS on a test network. Using<br>
> metasploit, a reverse shell was obtained through a PDF vulnerability.<br>
> Suricata saw the PDF transfer, but failed to see the shell open.<br>
><br>
> We felt that this was not a special attack, and should have been easily<br>
> detected. Are we wrong to think this? Is there a configuration setting we<br>
> missed?<br>
<br>
Hi,<br>
<br>
Which reverse shell attack is it?<br>
Is there a rule for that type of attack being loaded when Suri starts?<br>
Are all your networks configured correctly? (HOME EXTERNAL)<br>
How do you mean "Suricata saw" the PDF transfer? Did you save it to<br>
disk with file extraction?<br>
What/which rule set do you load with Suricata?<br>
<br>
<br>
<br>
><br>
> Our network is designed so that the IDS is also the gateway into our<br>
> "internal network". All network traffic with the "outside world" goes<br>
> through this machine.<br>
<br>
Is all offloading disabled on the network card that the IDS uses?<br>
<br>
Thanks<br>
<br>
><br>
> Thanks,<br>
> James<br>
><br>
<br>
--<br>
Regards,<br>
Peter Manev<br>
_______________________________________________<br>
Suricata IDS Users mailing list: <a href="mailto:oisf-users@openinfosecfoundation.org">oisf-users@openinfosecfoundation.org</a><br>
Site: <a href="http://suricata-ids.org" target="_blank">http://suricata-ids.org</a> | Support: <a href="http://suricata-ids.org/support/" target="_blank">http://suricata-ids.org/support/</a><br>
List: <a href="https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users" target="_blank">https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users</a><br>
OISF: <a href="http://www.openinfosecfoundation.org/" target="_blank">http://www.openinfosecfoundation.org/</a><br>
</div></div></blockquote></div><br></div>