427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet143/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   139   140   141   142   143   144   145   146   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
170
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 170



[content:”221 Goodbye, have a good infection |3a 29 2e 0d 0a|”]
defines
the actual signature that will trigger the alert.

[dsize:40]
specifies the value against which the packet’s payload size
should be tested.

[classtype:trojan-activity]
denotes that the event is to be logged as
“trojan-activity,” but it could be logged as any registered “classtype.”

[reference:url,www.lurhq.com/phatbot.html]
denotes the external attack
reference ID—in this case, the URL for Joe’s analysis.

[sid:1000075]
signifies the Snort rule identifier.

[; rev 1;]
specifies the revision number. Obviously, you would incre-
ment this number as needed.
Here’s a supplementary signature from the same source:
alert tcp any any -> any any (msg:"Phatbot P2P Control Connection";
flow:established; content:"Wonk-"; content:"|00|#waste|00|"; within:15;
classtype:trojan-activity; reference:url,www.lurhq.com/phatbot.html;
sid:1000076; rev:1;)
This signature is very similarly constructed to the first:
[within:15;]
speci-
fies that the two “content” patterns are to be within 15 bytes of each other.
However, Snort signatures can be used to counter a far wider range of
threats than bots.The following snippet is a signature created by Martin
Overton for W32/Netsky.P and used here as an example, again with his kind
permission:
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"W32.NetSky.p@mm - MIME";
content: "X7soIUEAR4s3r1f/E5UzwK51/f4PdO/+D3UGR/83r+sJ/g8PhKLw/v9XVf9T";
classtype: misc-activity;)

[$EXTERNAL_NET any]
means that the rule should trigger on any
TCP port. (The 
any
keyword could be replaced by a specific port
such as 110, the TCP port used by a POP mail client.) However,
using the variable 
$EXTERNAL_NET
specifies that the rule should
trigger only if the offending packet comes from an external IP
address.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   139   140   141   142   143   144   145   146   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish