<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IDS, detection of encrypted packets within non-SSL traffic streams? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ids-detection-of-encrypted-packets-within-non-ssl-traffic/m-p/1400778#M67995</link>
    <description>&lt;P&gt;All...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a host on the internal network that has a reverse shell to the outside world, and the packets being sent back to the attacker are encrypted, over a standard web (TCP/80) port - which is allowed by Websense or URL filter of choice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can a custom signature be created to alert on the detection of encrypted packets / data streams over non-encrypted transmissions? We've found other IDS/IPS systems that we're able to build custom sigs to detect and alert on these streams, but are wondering if we can do that in within Cisco IDS/IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please be specific if possible...let's assume the organization is using the latest version of Cisco IDS software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:53:33 GMT</pubDate>
    <dc:creator>astroman</dc:creator>
    <dc:date>2019-03-10T11:53:33Z</dc:date>
    <item>
      <title>IDS, detection of encrypted packets within non-SSL traffic streams?</title>
      <link>https://community.cisco.com/t5/network-security/ids-detection-of-encrypted-packets-within-non-ssl-traffic/m-p/1400778#M67995</link>
      <description>&lt;P&gt;All...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a host on the internal network that has a reverse shell to the outside world, and the packets being sent back to the attacker are encrypted, over a standard web (TCP/80) port - which is allowed by Websense or URL filter of choice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can a custom signature be created to alert on the detection of encrypted packets / data streams over non-encrypted transmissions? We've found other IDS/IPS systems that we're able to build custom sigs to detect and alert on these streams, but are wondering if we can do that in within Cisco IDS/IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please be specific if possible...let's assume the organization is using the latest version of Cisco IDS software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids-detection-of-encrypted-packets-within-non-ssl-traffic/m-p/1400778#M67995</guid>
      <dc:creator>astroman</dc:creator>
      <dc:date>2019-03-10T11:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: IDS, detection of encrypted packets within non-SSL traffic s</title>
      <link>https://community.cisco.com/t5/network-security/ids-detection-of-encrypted-packets-within-non-ssl-traffic/m-p/1400779#M67997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you got Sig 11233 series enabled?&amp;nbsp; It does, BTW, appear to exclude "WEBPORTS."&amp;nbsp; Maybe a copy could be made to exclude only TCP 443. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Feb 2010 16:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids-detection-of-encrypted-packets-within-non-ssl-traffic/m-p/1400779#M67997</guid>
      <dc:creator>bnidacoc</dc:creator>
      <dc:date>2010-02-17T16:40:38Z</dc:date>
    </item>
  </channel>
</rss>

