<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: All signature alerts have backwards attacker and victim IPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015707#M54745</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's one that just came in 5 minutes ago.&lt;/P&gt;&lt;P&gt;192.168.1.15 is an example IP of an internal host being served with a malicious cookie from 203.0.113.13.&amp;nbsp;&amp;nbsp; If the deny-attacker-inline or shun command fired, it would have blocked the internal host, not the actual IP originating the attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8/28/2012 8:55 AM : CISCO-CIDS-MIB:ciscoCidsAlert&amp;nbsp; SNMP Trap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received Time:8/28/2012 8:55:25 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source:127.0.0.1(SITE-IPS)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Community:snip!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Variable Bindings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sysUpTime:= 12 days 18 hours 53 minutes 48.73 seconds (110482873)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapOID:= CISCO-CIDS-MIB:ciscoCidsAlert (1.3.6.1.4.1.9.9.383.0.1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralEventId:= 1355060886281233658&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralLocalTime:= 8/28/2012 9:55:25 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralUTCTime:= 8/28/2012 2:55:25 PM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralOriginatorHostId:= SITE-IPS2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSeverity:= high&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAlarmTraits:= 2147483648&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignature:= Crafted Session Cookie Value&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSigName:= RhinoSoft Serv-U TEA Decoding Buffer Overflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSigId:= 22839&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSubSigId:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureVersion:= S458&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertInterfaceGroup:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertVlan:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAttackerContext:= ZUNsaWVudElEPTAmcGFyZW50RG9jSWQ9ZjBlNzExNzgtODkyMy1hODE1LTFk&lt;/P&gt;&lt;P&gt;MGMtZDQ2NjI3OGZjNmU5JnRpbWVzdGFtcD0wJm9yaWdpbklzVGVtcGxhdGU9&lt;/P&gt;&lt;P&gt;MCZ1c2VyPSZleHRyYV9tc2c9ZWRpdG9yU3RhcnRlZCBIVFRQLzEuMQ0KQWNj&lt;/P&gt;&lt;P&gt;ZQ==&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAttackerAddress:= 192.168.1.15:58127&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertVictimAddress:= osIdSource="unknown" osRelevance="unknown" osType="unknown" 203.0.113.13:80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertDetails:= InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertEventRiskRating:= 70&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.26:= 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.27:= 6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.42:= 70&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2012 15:01:23 GMT</pubDate>
    <dc:creator>jp.senior</dc:creator>
    <dc:date>2012-08-28T15:01:23Z</dc:date>
    <item>
      <title>All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015703#M54738</link>
      <description>&lt;P&gt;Hi, all.&lt;/P&gt;&lt;P&gt;Using IPS S661 and 7.0.7(E4) and AIP-SSM in a few locations, most if not all of the signatures for attacker and victim are completely backwards.&lt;/P&gt;&lt;P&gt;Should I have turned the IPS on in an active mode it would have shunned critical infrastructure hosts, web proxy appliances, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the best way for the IPS to know what we consider 'inside' and 'outside' ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Modifying individual signatures isn't an acceptable option as I can't possibly modify each and every single one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-JP&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015703#M54738</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2019-03-10T12:45:18Z</dc:date>
    </item>
    <item>
      <title>All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015704#M54740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you really talking about the "Attacker" and "Victim" or do you talk about the "Location"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first should be fine for most build-in signatures. The Location is controlled by your configuration there you can "name" your networks and these names are displayed together with the attacker and the victim.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 21:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015704#M54740</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-17T21:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015705#M54741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply, Karsten.&lt;/P&gt;&lt;P&gt;I mean specifically 'attacker' and 'victim' in all of the alert settings. If the IPS should decide to shun an "attacker" host (deny-attacker-inline action), it would block my trusted hosts, not the exploited website out in the wild.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 14:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015705#M54741</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2012-08-28T14:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015706#M54743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's really strange. Please enable a verbose alert on a signature that you know to fail (and that won't have sensitive content) and show the log-message of the event.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 14:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015706#M54743</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-28T14:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015707#M54745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's one that just came in 5 minutes ago.&lt;/P&gt;&lt;P&gt;192.168.1.15 is an example IP of an internal host being served with a malicious cookie from 203.0.113.13.&amp;nbsp;&amp;nbsp; If the deny-attacker-inline or shun command fired, it would have blocked the internal host, not the actual IP originating the attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8/28/2012 8:55 AM : CISCO-CIDS-MIB:ciscoCidsAlert&amp;nbsp; SNMP Trap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received Time:8/28/2012 8:55:25 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source:127.0.0.1(SITE-IPS)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Community:snip!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Variable Bindings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sysUpTime:= 12 days 18 hours 53 minutes 48.73 seconds (110482873)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapOID:= CISCO-CIDS-MIB:ciscoCidsAlert (1.3.6.1.4.1.9.9.383.0.1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralEventId:= 1355060886281233658&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralLocalTime:= 8/28/2012 9:55:25 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralUTCTime:= 8/28/2012 2:55:25 PM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsGeneralOriginatorHostId:= SITE-IPS2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSeverity:= high&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAlarmTraits:= 2147483648&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignature:= Crafted Session Cookie Value&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSigName:= RhinoSoft Serv-U TEA Decoding Buffer Overflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSigId:= 22839&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureSubSigId:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertSignatureVersion:= S458&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertInterfaceGroup:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertVlan:= 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAttackerContext:= ZUNsaWVudElEPTAmcGFyZW50RG9jSWQ9ZjBlNzExNzgtODkyMy1hODE1LTFk&lt;/P&gt;&lt;P&gt;MGMtZDQ2NjI3OGZjNmU5JnRpbWVzdGFtcD0wJm9yaWdpbklzVGVtcGxhdGU9&lt;/P&gt;&lt;P&gt;MCZ1c2VyPSZleHRyYV9tc2c9ZWRpdG9yU3RhcnRlZCBIVFRQLzEuMQ0KQWNj&lt;/P&gt;&lt;P&gt;ZQ==&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertAttackerAddress:= 192.168.1.15:58127&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertVictimAddress:= osIdSource="unknown" osRelevance="unknown" osType="unknown" 203.0.113.13:80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertDetails:= InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlertEventRiskRating:= 70&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.26:= 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.27:= 6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cidsAlert.42:= 70&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 15:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015707#M54745</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2012-08-28T15:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015708#M54748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's output from the show events on the IPS itself. Previous was from an SNMP trap I had configured.&lt;/P&gt;&lt;P&gt;The IPS identifies locality as an object I have already defined previously.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1355060886281233658 severity=high vendor=Cisco alarmTraits=2147483648&lt;/P&gt;&lt;P&gt;&amp;nbsp; originator:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: SITE-IPS2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 460&lt;/P&gt;&lt;P&gt;&amp;nbsp; time: 2012/08/28 14:55:25 2012/08/28 09:55:25 GMT-05:00&lt;/P&gt;&lt;P&gt;&amp;nbsp; signature: description=RhinoSoft Serv-U TEA Decoding Buffer Overflow id=22839 created=20100105 type=vulnerability version=S458&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: Crafted Session Cookie Value&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/BufferOverflow/Web&lt;/P&gt;&lt;P&gt;&amp;nbsp; interfaceGroup: vs0&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; participants:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=PROXYOBJECT 192.168.1.13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 58127&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=OUT 203.0.113.13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os: idSource=unknown relevance=unknown type=unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp; actions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapRequested: true&lt;/P&gt;&lt;P&gt;&amp;nbsp; context:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fromAttacker:&lt;/P&gt;&lt;P&gt;000000&amp;nbsp; 65 43 6C 69 65 6E 74 49&amp;nbsp; 44 3D 30 26 70 61 72 65&amp;nbsp; eClientID=0&amp;amp;pare&lt;/P&gt;&lt;P&gt;000010&amp;nbsp; 6E 74 44 6F 63 49 64 3D&amp;nbsp; 66 30 65 37 31 31 37 38&amp;nbsp; ntDocId=f0e71178&lt;/P&gt;&lt;P&gt;000020&amp;nbsp; 2D 38 39 32 33 2D 61 38&amp;nbsp; 31 35 2D 31 64 30 63 2D&amp;nbsp; -8923-a815-1d0c-&lt;/P&gt;&lt;P&gt;000030&amp;nbsp; 64 34 36 36 32 37 38 66&amp;nbsp; 63 36 65 39 26 74 69 6D&amp;nbsp; d466278fc6e9&amp;amp;tim&lt;/P&gt;&lt;P&gt;000040&amp;nbsp; 65 73 74 61 6D 70 3D 30&amp;nbsp; 26 6F 72 69 67 69 6E 49&amp;nbsp; estamp=0&amp;amp;originI&lt;/P&gt;&lt;P&gt;000050&amp;nbsp; 73 54 65 6D 70 6C 61 74&amp;nbsp; 65 3D 30 26 75 73 65 72&amp;nbsp; sTemplate=0&amp;amp;user&lt;/P&gt;&lt;P&gt;000060&amp;nbsp; 3D 26 65 78 74 72 61 5F&amp;nbsp; 6D 73 67 3D 65 64 69 74&amp;nbsp; =&amp;amp;extra_msg=edit&lt;/P&gt;&lt;P&gt;000070&amp;nbsp; 6F 72 53 74 61 72 74 65&amp;nbsp; 64 20 48 54 54 50 2F 31&amp;nbsp; orStarted HTTP/1&lt;/P&gt;&lt;P&gt;000080&amp;nbsp; 2E 31 0D 0A 41 63 63 65&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1..Acce&lt;/P&gt;&lt;P&gt;&amp;nbsp; alertDetails: InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ;&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: targetValueRating=medium 70&lt;/P&gt;&lt;P&gt;&amp;nbsp; threatRatingValue: 70&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface: backplane=GigabitEthernet0/1 context=single_vf physical=Unknown GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol: tcp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 15:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015708#M54748</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2012-08-28T15:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015709#M54751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jp.senior,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The signature "RhinoSoft Serv-U TEA Decoding Buffer Overflow" seems to have the correct value for swap-attacker-victim set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the context buffer, the victim port is 80 (the webserver) which is exploited via a large Cookie: value from the client (attacker).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe i'm misunderstanding the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neil Archibad&lt;/P&gt;&lt;P&gt;Cisco IPS Signature Development Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 18:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015709#M54751</guid>
      <dc:creator>nearchib</dc:creator>
      <dc:date>2012-09-06T18:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: All signature alerts have backwards attacker and victim IPs</title>
      <link>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015710#M54752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply Neil!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still not sure - I did some more packet captures on that sort of event.&amp;nbsp; The internet server gave the cookie to the inside PC on my network. My PC did not craft a malicious cookie.&lt;/P&gt;&lt;P&gt;Another example can be found here - windows media player network sharing service.&amp;nbsp; The client PC at the address below is clean and free of any discernable malware.&amp;nbsp; Only when we visit the website captured does this remote execution alert come up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot find any exceptions anywhere in that the attacker and victim IP addresses are correct.&amp;nbsp; I've properly specified locality but it seems like the IPS just doesn't care.&amp;nbsp; Again, if I enabled shunning/blocking, reams of trusted inside source IP addresses would be blocked when the client/victim pair is totally backwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1332568783191289629 severity=high vendor=Cisco alarmTraits=2147483648&lt;/P&gt;&lt;P&gt;&amp;nbsp; originator:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: cal-ips1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 457&lt;/P&gt;&lt;P&gt;&amp;nbsp; time: 2012/09/14 15:09:41 2012/09/14 09:09:41 GMT-07:00&lt;/P&gt;&lt;P&gt;&amp;nbsp; signature: description=Windows Media Player Network Sharing Service Remote Code Execution id=30459 created=20101011 type=vulnerability version=S519&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: CVE-2010-3225&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; marsCategory: Penetrate/RemoteCmdExec/Misc&lt;/P&gt;&lt;P&gt;&amp;nbsp; interfaceGroup: vs0&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; participants:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=grp-LAN 172.16.7.21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 51446&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: locality=OUT 204.188.138.127&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 554&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os: idSource=unknown relevance=unknown type=unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp; actions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapRequested: true&lt;/P&gt;&lt;P&gt;&amp;nbsp; alertDetails: InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ; Component Signature List: 30459.1 30459.2&amp;nbsp; ;&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: targetValueRating=medium 75&lt;/P&gt;&lt;P&gt;&amp;nbsp; threatRatingValue: 75&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface: backplane=GigabitEthernet0/1 context=single_vf physical=Unknown GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol: tcp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 15:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-signature-alerts-have-backwards-attacker-and-victim-ips/m-p/2015710#M54752</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2012-09-14T15:24:28Z</dc:date>
    </item>
  </channel>
</rss>

