<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dissecting IPS logs (triggered packets) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514649#M98612</link>
    <description>&lt;P&gt;How do i dissect the signature triggered packet captured from an IDS/IPS&lt;/P&gt;&lt;P&gt;eg:000010  08 00 45 00 02 0D C1 1D  00 00 80 06 79 92 AC 1C  ..E.........y...&lt;/P&gt;&lt;P&gt;000020  04 0C 0A 05 44 0E B6 8F  00 19 1E 38 04 FE 6E 1F  ....D......8..n.&lt;/P&gt;&lt;P&gt;000030  BC 0A 50 18 3E D6 B9 7E  00 00 31 20 31 38 36 39  ..P.&amp;gt;..~..1 1869&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:57:56 GMT</pubDate>
    <dc:creator>pratheesh.venu</dc:creator>
    <dc:date>2019-03-10T09:57:56Z</dc:date>
    <item>
      <title>Dissecting IPS logs (triggered packets)</title>
      <link>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514649#M98612</link>
      <description>&lt;P&gt;How do i dissect the signature triggered packet captured from an IDS/IPS&lt;/P&gt;&lt;P&gt;eg:000010  08 00 45 00 02 0D C1 1D  00 00 80 06 79 92 AC 1C  ..E.........y...&lt;/P&gt;&lt;P&gt;000020  04 0C 0A 05 44 0E B6 8F  00 19 1E 38 04 FE 6E 1F  ....D......8..n.&lt;/P&gt;&lt;P&gt;000030  BC 0A 50 18 3E D6 B9 7E  00 00 31 20 31 38 36 39  ..P.&amp;gt;..~..1 1869&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514649#M98612</guid>
      <dc:creator>pratheesh.venu</dc:creator>
      <dc:date>2019-03-10T09:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Dissecting IPS logs (triggered packets)</title>
      <link>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514650#M98613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IP Logs page displays all IP logs that are available for downloading on the system. IP logs are generated in two ways: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you turn on IP logging from Administration &amp;gt; IP Logging &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See Configuring IP Logging, for the procedure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you select log as the EventAction for a signature. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the sensor detects an attack based on this signature, it creates an IP log. See Configuring Signatures Through Virtual Sensor Signature Configuration Mode, for more information&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/module_installation_and_configuration_guides_chapter09186a00801a0c2a.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/module_installation_and_configuration_guides_chapter09186a00801a0c2a.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Apr 2006 17:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514650#M98613</guid>
      <dc:creator>mchin345</dc:creator>
      <dc:date>2006-04-11T17:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dissecting IPS logs (triggered packets)</title>
      <link>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514651#M98614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ethereal is a great tool to break it down, but it basically comes to learning TCP/IP really well.  Pickup TCP/IP Illustrated Vol 1 by stevens and read it from start to finish, multiple times  &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;45 00 02 0D C1 1D 00 00 80 06 79 92 AC 1C 04 0C 0A 05 44 0E&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the IP header portion of the packet. You can tell its an ipv4 packet, and 20 bytes long.  Also this is a tcp packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AC 1C 04 0C is the source IP  172.28.4.12&lt;/P&gt;&lt;P&gt;0A 05 44 0E is the destination 10.5.68.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tcp header follows with:&lt;/P&gt;&lt;P&gt;B6 8F 00 19 1E 38 04 FE 6E 1F BC 0A 50 18 3E D6 B9 7E 00 00 31 20 31 38 36 39&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B6 8F is source port 46735&lt;/P&gt;&lt;P&gt;00 19 is dest port 25&lt;/P&gt;&lt;P&gt;1E 38 04 FE  seq #&lt;/P&gt;&lt;P&gt;6E 1F BC 0A  ack #&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then its followed by your offset, flags, checksum etc... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2006 20:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514651#M98614</guid>
      <dc:creator>shawn.posthumus</dc:creator>
      <dc:date>2006-04-12T20:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: Dissecting IPS logs (triggered packets)</title>
      <link>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514652#M98615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SANS produces a great TCP/IP reference card.  Download, print, and keep handy.  It'll help you dissect the packet's various contents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://sans.org/resources/tcpip.pdf" target="_blank"&gt;http://sans.org/resources/tcpip.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the card makes no sense to you, and you want a quick fix, I would suggest downloading Ethereal.  Take the text trigger packet, and convert it to a pcap file using text2pcap.exe.  Its included with Ethereal.  Then load the file in Ethereal and it will break down the packet into its various elements for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ethereal.com/" target="_blank"&gt;http://www.ethereal.com/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Apr 2006 14:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dissecting-ips-logs-triggered-packets/m-p/514652#M98615</guid>
      <dc:creator>npham</dc:creator>
      <dc:date>2006-04-13T14:20:41Z</dc:date>
    </item>
  </channel>
</rss>

