Snort mailing list archives
Quick rule optimize request
From: James Lay <jlay () slave-tothe-box net>
Date: Tue, 17 Jul 2012 10:07:22 -0600
Hey all, Here's the rule: alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"INDICATOR-COMPROMISE possible WordPress head injection"; content:"add_action"; content:"wp_head"; content:"check_wp_head_load"; file_data; fast_pattern; classtype:bad-unknown; sid:10000015; reference: blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head; rev:1;) Chances are bad guys will change the function name, but other then that we'll see. This should match: @add_action("wp_head", "check_wp_head_load", mt_rand(1, 6)); But I don't have any packet caps to test this out on. Anyone have any input on this? Add some within entries perhaps? Anyone have a pcap of this? Thanks all. James ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Quick rule optimize request James Lay (Jul 17)
- Re: Quick rule optimize request Joel Esler (Jul 17)
- Message not available
- Re: Quick rule optimize request James Lay (Jul 17)
- Message not available
- Re: Quick rule optimize request Joel Esler (Jul 17)