<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding IPS log (sig:16297-Worm Activity) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047150#M54548</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here this guide can walk you through using your IPS to display and capture live traffic: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_packets.html"&gt;http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_packets.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2012 17:29:09 GMT</pubDate>
    <dc:creator>gspillma</dc:creator>
    <dc:date>2012-10-25T17:29:09Z</dc:date>
    <item>
      <title>Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047145#M54536</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are monitoring intrusions for a customer using SIEM and we got an alert based on the below IPS logs.&lt;BR /&gt;It would be great if someone helps clarify my doubts in analyzing this and similar IPS logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*********** Cisco IDS&amp;nbsp;&amp;nbsp;&amp;nbsp; 08 Oct 2012 08:50:36&amp;nbsp;&amp;nbsp;&amp;nbsp; id= xyxyxyxyxyxyxyxyxyx&amp;nbsp;&amp;nbsp;&amp;nbsp; sig_id= 16297&amp;nbsp;&amp;nbsp;&amp;nbsp; sig= Worm Activity - Brute Force&amp;nbsp;&amp;nbsp;&amp;nbsp; src= 10.10.10.4&amp;nbsp;&amp;nbsp;&amp;nbsp; src_port= [3539]&amp;nbsp;&amp;nbsp;&amp;nbsp; dst= 192.168.178.131&amp;nbsp;&amp;nbsp;&amp;nbsp; dst_port= [445]&amp;nbsp;&amp;nbsp;&amp;nbsp; sev= informational&amp;nbsp;&amp;nbsp;&amp;nbsp; proto= tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; eventId=1340445327004327804&amp;nbsp;&amp;nbsp;&amp;nbsp; severity=informational&amp;nbsp;&amp;nbsp;&amp;nbsp; vendor=Cisco&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:originator.sd:hostId=AIP-SSM-1&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:originator.cid:appName=sensorApp&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:originator.cid:appInstanceId=462&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:time.offset=XYZ&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:time.timeZone=XYZ&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:time=1349686236842887000&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.cid:created=20090331&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.cid:type=anomaly&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.cid:version=S392&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.description=Worm Activity - Brute Force&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.id=16297&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.cid:subsigId=0&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.cid:sigDetails=Multiple logon failures&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:signature.marsCategory=Propagate/Worm&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:interfaceGroup=vs0&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:vlan=0&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:attacker.sd:addr.cid:locality=OUT&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:attacker.sd:addr=10.10.10.4&amp;nbsp;&amp;nbsp; sd:participants.sd:attacker.sd:port=3539&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.sd:addr.cid:locality=OUT&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.sd:addr=192.168.178.131&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.sd:port=445&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.cid:os.idSource=learned&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.cid:os.relevance=relevant&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.cid:os.type=windows-nt-2k-xp&amp;nbsp;&amp;nbsp;&amp;nbsp; sd:participants.sd:target.cid:os=&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:context.cid:fromTarget= &amp;lt;removed&amp;gt; cid:context.cid:fromAttacker=&amp;lt;removed&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:alertDetails=InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:triggerPacket=&amp;lt;removed&amp;gt;&amp;nbsp; cid:riskRatingValue.attackRelevanceRating=relevant&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:riskRatingValue.targetValueRating=medium&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:riskRatingValue=25&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:threatRatingValue=25&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:interface.backplane=GigabitEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:interface.context=single_vf&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:interface.physical=Unknown&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:interface=GigabitEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; cid:protocol=tcp ************&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1. I checked for sig:16297 via ASDM demo version, but didn't found this signature in sig0. Where can we see this signature settings and properties. &lt;BR /&gt;2. The fields "cid:context.cid:fromTarget=", "cid:context.cid:fromAttacker=", &amp;amp; "cid:triggerPacket=" looks to be like encoded format. How to decode this, any tools/URL? How these fields are significant&lt;BR /&gt;3. If this is false postivie (based on src/dst and activity), how to fine tune this in IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: I don't have access to this IPS. But, I need to coach the owner for fine tuning and for other checks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jag.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047145#M54536</guid>
      <dc:creator>jagadeeshan.s</dc:creator>
      <dc:date>2019-03-10T12:47:53Z</dc:date>
    </item>
    <item>
      <title>Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047146#M54541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jag.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link with more information on alert 16297/0.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tools.cisco.com/security/center/viewIpsSignature.x?signatureId=16297&amp;amp;signatureSubId=1&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S392&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally on that signature I'd email the customer and ask them to check the attacker IP to ensure that the computer doesn't have a virus.&amp;nbsp; If these end up coming in frequently and the customer comes back stating they are false alerts then you may need to filter the alert or just send a report to the customer once a week with the IPs in question from the alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as decoding the fields in question 2, that comes out in base64.&amp;nbsp; We have a powershell script that decodes these fields.&amp;nbsp; I have tried various Web based decoders with mixed success which is why we wrote a powershell script to do the job.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 14:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047146#M54541</guid>
      <dc:creator>JonPBerbee</dc:creator>
      <dc:date>2012-10-09T14:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047147#M54543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Running a virus scan on the source IP address is a good first step.&amp;nbsp; If you come up with nothing then my next step would be to check the source for any misconfigured scripts or applications that may be causing the host to repeatedly reach out across the network which can trigger false positives.&amp;nbsp; We have observed cases where shutting down unnecesarry services can eliminate false positives. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 16:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047147#M54543</guid>
      <dc:creator>gspillma</dc:creator>
      <dc:date>2012-10-10T16:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047148#M54545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply! If you don't mind, can you share the PowerShell script? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jag.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 16:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047148#M54545</guid>
      <dc:creator>jagadeeshan.s</dc:creator>
      <dc:date>2012-10-25T16:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047149#M54546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checking with the users got to know that users were just accessing file servers over 445 port. I am wondering whether the signature will trigger just for normal NetBIOS traffic, nope it wouldn't be, so there should be something that this signature is specifically looking for. What's that. Is there any way to capture those traffic and analyze for suspicious using some packet capture tools? If so, what parameter I should look for to identify the suspicious? More questions coming in my mind.. -Jag.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 17:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047149#M54546</guid>
      <dc:creator>jagadeeshan.s</dc:creator>
      <dc:date>2012-10-25T17:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPS log (sig:16297-Worm Activity)</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047150#M54548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here this guide can walk you through using your IPS to display and capture live traffic: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_packets.html"&gt;http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_packets.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 17:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ips-log-sig-16297-worm-activity/m-p/2047150#M54548</guid>
      <dc:creator>gspillma</dc:creator>
      <dc:date>2012-10-25T17:29:09Z</dc:date>
    </item>
  </channel>
</rss>

