Snort mailing list archives
Re: HTTP interception/injection
From: Phillip Lee <phillile () sourcefire com>
Date: Wed, 14 Mar 2018 14:45:37 -0400
Yaser, Thanks for your submission. We will review the rules and get back to you when they're finished. Regards, Phil Lee Cisco Talos
On Mar 14, 2018, at 2:36 PM, Y M via Snort-sigs <snort-sigs () lists snort org> wrote: Hi, The below rules are based of CitizenLab report "Bad Traffic". The pcaps are available at the GitHub resource. alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"MALWARE-OTHER device-specific generic injected HTTP response"; flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect"; content:"Location|3A 20|"; content:"Connection|3A 20|close"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; metadata:ruleset community, service http; reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria <http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; sid:9000040; rev:1;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"MALWARE-OTHER device-specific file download injected HTTP response"; flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect|0A|"; content:"Location|3A 20|"; content:"Connection|3A 20|close|0A|"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; pcre:"/Location\x3a\x20.+\.php\x3f[a-z]\x3d[a-f0-9]{64}\x0a/i"; metadata:ruleset community, service http; reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria <http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; sid:9000041; rev:1;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"MALWARE-OTHER device-specific AdHose injected HTTP response"; flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect|0D 0A|"; content:"Location|3A 20|"; content:"Connection|3A 20|close|0D 0A|"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; pcre:"/Location\x3a\x20.+\.html\x0d\x0a/i"; metadata:ruleset community, service http; reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria <http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; sid:9000042; rev:1;) Thanks. YM _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org <mailto:Snort-sigs () lists snort org> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette> Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- HTTP interception/injection Y M via Snort-sigs (Mar 14)
- Re: HTTP interception/injection Phillip Lee (Mar 14)