[Oisf-users] Suricata: fail to detect reverse shell?
Cooper F. Nelson
cnelson at ucsd.edu
Tue Nov 26 22:00:56 UTC 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Did you try...
Using the emerging-shellcode.rules ruleset?
Uncommenting all the shellcode rules?
What port was the reverse shell over? Suricata will ignore shellcode
over port 80 via this directive in the default yaml file:
>SHELLCODE_PORTS: "!80"
- -Coop
On 11/24/2013 7:01 PM, James Harrison wrote:
> Hello,
>
> My class team recently setup the Suricata IDS on a test network.
> Using metasploit, a reverse shell was obtained through a PDF
> vulnerability. Suricata saw the PDF transfer, but failed to see the
> shell open.
>
> We felt that this was not a special attack, and should have been
> easily detected. Are we wrong to think this? Is there a configuration
> setting we missed?
>
> Our network is designed so that the IDS is also the gateway into our
> "internal network". All network traffic with the "outside world" goes
> through this machine.
>
> Thanks, James
>
>
>
> _______________________________________________ Suricata IDS Users
> mailing list: oisf-users at openinfosecfoundation.org Site:
> http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List:
> https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> OISF: http://www.openinfosecfoundation.org/
>
- --
Cooper Nelson
Network Security Analyst
UCSD ACT Security Team
cnelson at ucsd.edu x41042
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQEcBAEBAgAGBQJSlRoYAAoJEKIFRYQsa8FWQUoIALUU9GZSTGiP3+3+o7M8INkN
juRYnEph2DidqFJpAjzGsjbl7SuJasC6c15ttjInVC0A7spN3Q0C/ZCaE8DMGLXX
lkDvPr/NE9ZFIg5vxGMLAs8eEBwva3qPTgwbC7LDzoQhMixeZKWrqpnidWLIamHI
EwjGfdffiWlbL5HRLBVrGT1GdQfON01GEeMT63zXZbAjA9+6CaJEc8kkQPz5wTxa
+0YVMoVcYLQ8Brvi/IVhbxn15qwk6BeO8o/66ShS89lVIAKx8ud5zYBKC+8qMHeF
2GnW0Wn8WL5bIJstJIGeoQfPKX6lbwd0j01CWAkIGsR0pszUDnXAFr+d6vh+eyk=
=Kw7t
-----END PGP SIGNATURE-----
More information about the Oisf-users
mailing list