427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet142/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   138   139   140   141   142   143   144   145   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
169
427_Botnet_05.qxd 1/9/07 9:59 AM Page 169


and only basic testing is applied by VRT—that is, sufficient to ensure that
they don’t break the application. However, community rules are often
expertly created and rigorously tested by the community before they are sub-
mitted to VRT.
The Bleedingsnort resource at www.bleedingsnort.com is a source of
“bleeding-edge” rules and signatures of variable quality.Their usefulness
depends, again, on the constructional and testing abilities of their creator.
Rolling Your Own
Here are two Snort signatures created by (and used by kind permission of )
Joe Stewart and published as part of an analysis of Phatbot (www.lurhq.com/
phatbot.html):
alert tcp any any -> any any (msg:"Agobot/Phatbot Infection Successful";
flow:established; content:"221 Goodbye, have a good infection |3a 29 2e 0d
0a|"; dsize:40; classtype:trojan-activity;
reference:url,www.lurhq.com/phatbot.html; sid:1000075; rev:1;)
We can’t do more than suggest the rich functionality offered by Snort sig-
natures, but here’s a brief guide as to how this one works:

[alert tcp]
instructs the software to send an alert when the signature
later in the rule is seen in a TCP packet. (Snort can also scan UDP
and ICMP traffic.)

The first 
any
defines the IP range for which the alert should trigger.
In this case, it applies whether the IP address is local or external.

The second 
any
means that the alert should trigger irrespective of
TCP port.

[-> any any]
tells us that the alert should trigger irrespective of the
location of the target IP and on any port (again, this will be a TCP
port in this case).

[(msg:”Agobot/Phatbot Infection Successful”;]
specifies the text to be
used by the alert to identify the event.The message may be sent via
an external program as well as to the screen or log file.

The 
flow
keyword establishes the direction of the traffic flow. In this
case, the alert will trigger only on established connections.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   138   139   140   141   142   143   144   145   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish