<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Norix, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971177#M925638</link>
    <description>&lt;P&gt;Hello Norix,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your comment. &amp;nbsp;I believe this is in the wrong forum to get the proper assistance. &amp;nbsp;Please try posting this to the &lt;A href="https://supportforums.cisco.com/community/12244781/snort-rule-coverage" target="_blank"&gt;Snort Rule Coverage&lt;/A&gt; rather than AMP as this will allow the proper personnel to address the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matthew Franks&lt;/P&gt;
&lt;P&gt;ENGINEER, CUSTOMER SUPPORT&lt;/P&gt;
&lt;P&gt;FirePOWER TAC&lt;/P&gt;</description>
    <pubDate>Tue, 30 Aug 2016 14:04:47 GMT</pubDate>
    <dc:creator>Matthew Franks</dc:creator>
    <dc:date>2016-08-30T14:04:47Z</dc:date>
    <item>
      <title>Signature to detect DNS Tunneling - SourceFire</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971176#M925637</link>
      <description>&lt;P&gt;Experts,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have gone through some recent vulnerabilities document from cisco and came to read a topic on DNS Tunneling &amp;amp; an Application tool that may perform such activity - DNScapy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DNScapy is a DNS tunneling tool. The code is very light and written in Python. It includes a server and a client. The server can handle multiple clients.&lt;/P&gt;
&lt;P&gt;DNScapy creates an SSH tunnel through DNS packets. SSH connection, SCP and proxy socks (SSH -D) are supported. You can use CNAME records or TXT records for the tunnel. The default mode is RAND, which uses randomly both CNAME and TXT.&lt;/P&gt;
&lt;P&gt;DNScapy uses Scapy (&lt;A href="http://www.secdev.org/scapy" rel="nofollow" target="_blank"&gt;http://www.secdev.org/scapy&lt;/A&gt;) for DNS packet forging and for his network automation API.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now, on the preventive end, is there any Signature Cisco may want to release for IPS &amp;amp; Sourcefire units?&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_45 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="45" data-gr-id="45"&gt;Is&lt;/G&gt; there any measures Cisco suggest we could implement from within the device?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Norix S.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971176#M925637</guid>
      <dc:creator>Norix S</dc:creator>
      <dc:date>2020-02-21T13:54:27Z</dc:date>
    </item>
    <item>
      <title>Hello Norix,</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971177#M925638</link>
      <description>&lt;P&gt;Hello Norix,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your comment. &amp;nbsp;I believe this is in the wrong forum to get the proper assistance. &amp;nbsp;Please try posting this to the &lt;A href="https://supportforums.cisco.com/community/12244781/snort-rule-coverage" target="_blank"&gt;Snort Rule Coverage&lt;/A&gt; rather than AMP as this will allow the proper personnel to address the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matthew Franks&lt;/P&gt;
&lt;P&gt;ENGINEER, CUSTOMER SUPPORT&lt;/P&gt;
&lt;P&gt;FirePOWER TAC&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 14:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971177#M925638</guid>
      <dc:creator>Matthew Franks</dc:creator>
      <dc:date>2016-08-30T14:04:47Z</dc:date>
    </item>
    <item>
      <title>Frank</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971178#M925639</link>
      <description>&lt;P&gt;Frank&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Noted on the correction.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 23:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971178#M925639</guid>
      <dc:creator>Norix S</dc:creator>
      <dc:date>2016-08-30T23:58:36Z</dc:date>
    </item>
    <item>
      <title>anyone care to share their</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971179#M925640</link>
      <description>&lt;P&gt;anyone care to share their thoughts on this?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2016 03:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971179#M925640</guid>
      <dc:creator>Norix S</dc:creator>
      <dc:date>2016-09-01T03:03:21Z</dc:date>
    </item>
    <item>
      <title>I too have the same question</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971180#M925641</link>
      <description>&lt;P&gt;I too have the same question guys, any update ?&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 10:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/2971180#M925641</guid>
      <dc:creator>paulturn</dc:creator>
      <dc:date>2016-11-28T10:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Signature to detect DNS Tunneling - SourceFire</title>
      <link>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/3187312#M925642</link>
      <description>Did you find any solution?&lt;BR /&gt;Thank you</description>
      <pubDate>Thu, 21 Sep 2017 12:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-to-detect-dns-tunneling-sourcefire/m-p/3187312#M925642</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2017-09-21T12:15:41Z</dc:date>
    </item>
  </channel>
</rss>

