<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Snort Signature Help Required. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317275#M1041396</link>
    <description>Hi Joel,&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;&lt;BR /&gt;Actually the requirement is to trigger an event whenever its matching either cmd, connect or target keywords in any content of URI.&lt;BR /&gt;&lt;BR /&gt;Do you want me to write this rule in 3 times after containing different content keywords or the below one is sufficient.&lt;BR /&gt;&lt;BR /&gt;alert tcp any any -&amp;gt; 10.X.X.X/24 any (msg:"Malicious code detection";flow:to_server,established;content:"cmd"; nocase; http_uri; content:"connect";nocase; http_uri; content:"target"; nocase; http_uri;)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Ankush Kumar&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 24 Jan 2018 01:17:22 GMT</pubDate>
    <dc:creator>Ankush Kumar</dc:creator>
    <dc:date>2018-01-24T01:17:22Z</dc:date>
    <item>
      <title>Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3316377#M1041394</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need one help where there as per requirement we made a custom signature on snort inbuilt in Firepower series. But the issue is its not triggering anything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am copying the signature which is made and its based on content. The requirement is to look into the content and in case if its matching then it should trigger an event.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;alert tcp any any -&amp;gt; 10.X.X.X/24 any (content: "GET";content-list:"cmd"|"target"|"CONNECT";msg: "Malicious code detection";)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Ankush Kumar&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3316377#M1041394</guid>
      <dc:creator>Ankush Kumar</dc:creator>
      <dc:date>2020-02-21T15:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317245#M1041395</link>
      <description>&lt;P&gt;You need to write three different rules to do what you are trying to do here. One for each command. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 23:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317245#M1041395</guid>
      <dc:creator>Joel Esler</dc:creator>
      <dc:date>2018-01-23T23:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317275#M1041396</link>
      <description>Hi Joel,&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;&lt;BR /&gt;Actually the requirement is to trigger an event whenever its matching either cmd, connect or target keywords in any content of URI.&lt;BR /&gt;&lt;BR /&gt;Do you want me to write this rule in 3 times after containing different content keywords or the below one is sufficient.&lt;BR /&gt;&lt;BR /&gt;alert tcp any any -&amp;gt; 10.X.X.X/24 any (msg:"Malicious code detection";flow:to_server,established;content:"cmd"; nocase; http_uri; content:"connect";nocase; http_uri; content:"target"; nocase; http_uri;)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Ankush Kumar&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Jan 2018 01:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317275#M1041396</guid>
      <dc:creator>Ankush Kumar</dc:creator>
      <dc:date>2018-01-24T01:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317303#M1041397</link>
      <description>This rule, as written will require that all three need to be in the same uri, in any order.  &lt;BR /&gt;</description>
      <pubDate>Wed, 24 Jan 2018 02:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317303#M1041397</guid>
      <dc:creator>Joel Esler</dc:creator>
      <dc:date>2018-01-24T02:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317305#M1041399</link>
      <description>Hi Joel,&lt;BR /&gt;&lt;BR /&gt;Thanks again for your quick response.&lt;BR /&gt;&lt;BR /&gt;What in case I want either of condition then, can it be accomplished without writing three different rules mentioning different keywords or withing single rule we can accomplish?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Ankush Kumar</description>
      <pubDate>Wed, 24 Jan 2018 02:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317305#M1041399</guid>
      <dc:creator>Ankush Kumar</dc:creator>
      <dc:date>2018-01-24T02:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Signature Help Required.</title>
      <link>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317666#M1041401</link>
      <description>&lt;P&gt;You'd have to have a common triggering condition for all three commands.. &amp;nbsp;For instance:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;alert tcp any any -&amp;gt; 10.X.X.X/24 any (msg:"Malicious code detection";flow:to_server,established; content:"GET /"; depth:5; content:"GET"; http_method; content:"/"; http_uri; depth:1;&amp;nbsp;pcre:"/(cmd|connect|target)/Ui; metadata:service http;)&lt;BR /&gt;&lt;BR /&gt;But I would never run this rule in a production environment, because of false positives, and the fact that this rule will "enter" (or be evaluated) on literally every GET packet on the network.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 13:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-signature-help-required/m-p/3317666#M1041401</guid>
      <dc:creator>Joel Esler</dc:creator>
      <dc:date>2018-01-24T13:50:41Z</dc:date>
    </item>
  </channel>
</rss>

