[Oisf-users] Suricata - w3af integration to find malware in websites

Andres Riancho andres.riancho at gmail.com
Tue Oct 8 13:51:28 UTC 2013


On Tue, Oct 8, 2013 at 7:48 AM, Victor Julien <lists at inliniac.net> wrote:
> On 10/08/2013 03:05 AM, Andres Riancho wrote:
>> List,
>>     Let me introduce myself, my name is Andres Riancho and I'm the
>> w3af [0] project leader. w3af is an open source web application
>> security scanner, and I was thinking about integrating a small subset
>> of suricata's rules into it.
>>     The idea is rather simple, parse the rules which identify
>> botnets/malware in http response bodies and apply them to each http
>> response that w3af gets from the target site while it's crawling it.
>> If a match is found, report a vulnerability to the user; that
>> vulnerability will contain all the information (URLs, fix, more info,
>> etc.) provided by the suricata rule.
>>     My questions to the suricata community are:
>>         * What do you think about the idea?
>>         * Do you expect this to trigger lots of false positives? How
>> could I reduce them?
> The closer the logic is to how we process http, the less fp's you should
> get.

Makes sense. Also, a question for Suricata admins that analyze lots of
traffic: Are there any specific signatures for http response content
matching I should disable?

>>         * w3af is GPLv2.0, can I bundle the suricata rules with it?
> Suricata ships only a special kind of rules (decoder events and other
> events the engine itself generates), for the rest ppl mostly use ET
> and/or VRT.

Thanks for the clarification on suricata rules, VRT and ET.

PS: I'm an IDS noob, when you say VRT it is [0] and ET is [1] , correct?

[0] http://www.snort.org/vrt
[1] http://www.emergingthreats.net/

>>         * Is there any well tested suricata rule parser written in python?
> rule2alert is written in python and generates pcaps based on rules, so
> it should parse them fairly well: https://github.com/pevma/rule2alert

Excellent, will use that one

>>         * Any similar project you want me to look into?
>>         * Are there major differences between snort and suricata
>> rules? Which ruleset should I use for this task?
> It's not really about snort vs suricata, but more about using ET vs VRT
> I think. The ET set is BSD licensed mostly iirc, so you should be able
> to use that.

Well, BSD and GPL are incompatible licenses, but I'll try to find out
more about the licensing of ET and VRT

> --
> ---------------------------------------------
> Victor Julien
> http://www.inliniac.net/
> PGP: http://www.inliniac.net/victorjulien.asc
> ---------------------------------------------
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> OISF: http://www.openinfosecfoundation.org/

Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

More information about the Oisf-users mailing list