Snort mailing list archives

Re: [Snort-sigs] Re: Fw: Cisco Vulnerability Testing Results


From: "Marc Quibell" <mquibell () fbfs com>
Date: Tue, 22 Jul 2003 08:35:58 -0500



Message: 3
To: Jon Hart <warchild () spoofed org>
Date: Sun, 20 Jul 2003 12:07:06 -0400 (EDT)
From: Michael Scheidell <scheidell () secnap net>
Cc: Gary Morris <gmorris () govolution com>, intrusions () incidents org,
     snort-sigs () lists sourceforge net, snort-users () lists sourceforge net
Subject: [Snort-users] Re: [Snort-sigs] Re: Fw: Cisco Vulnerability Testing
Results


alert ip $EXTERNAL_NET any -> $HOME_NET any (msg: "CISCO: IP Proto 53
(Swipe) detected"; ip_proto: 53; classtype:denial-of-service;)
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg: "CISCO: IP Proto 55
(IP Mobility) detected"; ip_proto: 55; classtype:denial-of-service;)
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg: "CISCO: IP Proto 77
(SUN ND) detected"; ip_proto: 77; classtype:denial-of-service;)
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg: "CISCO: IP Proto 103
(PIM) detected"; ip_proto: 103; classtype:denial-of-service;)


A couple of thoughts:
1) as discussed on a couple of other lists, the ttl at the destination
device would be 0? or 1? (guess I need to attack myself and look)

Why would that be? If it was ttl 1 it would never get past their own router.

2) I would expect that our snort boxes are NOT configured on the WAN
(serial/frame relay/fiber) side of our routers so we won't pick up
directed attacks against our correct router, however, any dual WAN routers
that are used for our subnets will pick it up, as well as anyone doing
address sweeps.  Without snort listening on the OUTSIDE of your router, you
won't pick up the attack.

Very true, but then, attackers don't necessarily have to attack the WAN router
only..

3) The CISCO released ACL snipps may prove a better way to watch the
traffic (put the acl's on for the above protocols, even if you have
upgraded your firmware and use the 'log' or 'log-interface' option if you
have multiple interfaces.  If you want to feed these logs to snort, you
can do it with one of several add-ons, or, make snort sig to watch the
syslog udp going from your router to your syslog server.

ACLs only show a count...

--
Michael Scheidell
SECNAP Network Security, LLC
Sales: 866-SECNAPNET / (1-866-732-6276)
Main: 561-368-9561 / www.secnap.net




-------------------------------------------------------
This SF.net email is sponsored by: VM Ware
With VMware you can run multiple operating systems on a single machine.
WITHOUT REBOOTING! Mix Linux / Windows / Novell virtual machines at the
same time. Free trial click here: http://www.vmware.com/wl/offer/345/0
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: