<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: can ips be used to block *.exe downloads in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954483#M80303</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you find an answer to this question?&amp;nbsp; We are looking to do the same thing here and I'm just starting to research it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Dec 2010 13:52:09 GMT</pubDate>
    <dc:creator>PronetMSSP</dc:creator>
    <dc:date>2010-12-09T13:52:09Z</dc:date>
    <item>
      <title>can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954481#M80301</link>
      <description>&lt;P&gt;Hello does any one know if the IPS signatures on an ips module in an ASA  can be used to stop *.exe downloads&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers for any info&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954481#M80301</guid>
      <dc:creator>mark007uk</dc:creator>
      <dc:date>2019-03-10T11:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954482#M80302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the IDS appliance, but it should be doable.  I've tried various engines and I'm not making any progress with my testing though.  I'm looking to duplicate the following snort rule, can a Cisco sig analyst help us out here?:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy.rules:# alert tcp $EXTERNAL_NET $HTTP_PORTS -&amp;gt; $HOME_NET any (msg:"POLICY download of executable content"; flow:to_client,established; content:"application/octet-stream"; nocase; pcre:"/^Content-Type\x3a[\x20\x09]+application\/octet-stream/smi"; pcre:"/(\r?\n){2}MZ/sm"; reference:url,www.microsoft.com/smallbusiness/resources/technology/security/practice_safe_computing_and_thwart_online_thugs.mspx; classtype:policy-violation; sid:11192; rev:1;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fwiw, the above rule isn't complete either, but it's a start.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 15:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954482#M80302</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-04-15T15:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954483#M80303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you find an answer to this question?&amp;nbsp; We are looking to do the same thing here and I'm just starting to research it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 13:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954483#M80303</guid>
      <dc:creator>PronetMSSP</dc:creator>
      <dc:date>2010-12-09T13:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954484#M80309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't remember how I tested and why it wan't working, but it should be pretty easily actually using the service HTTP engine.&amp;nbsp; I would focus on using the content-type header in the response (versus looking at the GET request).&amp;nbsp; Clone 5343-0.&amp;nbsp; Change the regex to something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[Cc][Oo][Nn][Tt][Ee][Nn][Tt][-][Tt][Yy][Pp][Ee][:][ \t]+[Aa][Pp][Pp][Ll][Cc][Aa][Tt][Ii][Oo][Nn][/][Oo][Cc][Tt][Ee][Tt]-[Ss][Tt][Rr][Ee][Aa][Mm]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWIW, there are many more content-types that are "executable", but that's a big one.&amp;nbsp; You'd need a rule for each content type. And of course this won't work for HTTPS or pure FTP downloads. For a start on some others, try here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="font-size: 2; "&gt;&lt;P&gt;&lt;A href="http://mimeapplication.net/octet-stream"&gt;http://mimeapplication.net/octet-stream&lt;/A&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 14:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954484#M80309</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2010-12-09T14:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954485#M80315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the quick reply and for the information.&amp;nbsp; I'll start digging further into it and create a test signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cory&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 14:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954485#M80315</guid>
      <dc:creator>PronetMSSP</dc:creator>
      <dc:date>2010-12-09T14:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954486#M80321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's two ways of doing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) engine service-http&lt;/P&gt;&lt;P&gt;This engine only inspects traffic going FROM a client TO a webserver. An uri regex of [.][eE][xX][eE]\x20 should do just fine to keep clients from requesting a file like that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) engine string-tcp&lt;/P&gt;&lt;P&gt;inspect traffic coming FROM #WEBPORTS&lt;/P&gt;&lt;P&gt;Just the like the snort rule a [\r\n][\r\n][\r\n][\r\n]MZ should do. If you watch the download of an .exe in Wireshark, you'll see the 2 \r\n followed by the first bytes of the exe, which in Windows usually starts with 'MZ'. Btw, since it's the same signature bytes for .dlls, this regex would also block the download of .dll files&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;P&gt;IPS Signature Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 14:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954486#M80321</guid>
      <dc:creator>mzeiser</dc:creator>
      <dc:date>2010-12-09T14:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954487#M80326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much. I imagine option A will work just fine but I'll have to look into these and see which option will be better for us.&amp;nbsp; This will mainly be used to block malware from downloading executables but will also help stop the occasional user download.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cory&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 16:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954487#M80326</guid>
      <dc:creator>PronetMSSP</dc:creator>
      <dc:date>2010-12-09T16:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: can ips be used to block *.exe downloads</title>
      <link>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954488#M80335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;doh! I think I knew that at one time. That's really unfortunate, but that would probably explain why my tests didn't work back then. Use a GET request is not particularly useful.&amp;nbsp; The content-type is what is primarily used by the browser to determine how the file is treated and there may not be a filename at all in the GET line (i.e. ?getfile=1 can return a file).&amp;nbsp; go with option 2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Dec 2010 16:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-ips-be-used-to-block-exe-downloads/m-p/954488#M80335</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2010-12-09T16:59:14Z</dc:date>
    </item>
  </channel>
</rss>

