Snort alert signatures

21
[Sharing Knowledge] SNORT : Analyzing and Signatures Deris Stiawan Ph.D Candidate Faculty of Computer Science & Information System Universiti Teknolgi Malaysia 2012

Transcript of Snort alert signatures

Page 1: Snort alert signatures

[Sharing Knowledge]

SNORT : Analyzing and Signatures

Deris Stiawan

Ph.D Candidate

Faculty of Computer Science & Information System

Universiti Teknolgi Malaysia

2012

Page 2: Snort alert signatures

1st run : Scanning

• Scanning tools with NMAP

– NMAP : powerful network scanning

– To find information detailed

– To find vulnerability from port / daemon / application active run

– Mapping of network

• Command :

– nmap –v ip target

– nmap –v –Sv

– nmap -v -O -sF

Page 3: Snort alert signatures
Page 4: Snort alert signatures

• Scanning tools with NIKTO

– NIKTO: powerful web scanner

– Testing IIS / Apache running on web server in target

– Checks your CGI vulnerabilities

Page 5: Snort alert signatures
Page 6: Snort alert signatures

2nd : Sniffing

• Sniffing data

– TCPdump / tshark

Page 7: Snort alert signatures
Page 8: Snort alert signatures

3rd : Analyzing

• Analyzed and recognized threat with Snort

– Analyzing from packet

– Snort.conf

Page 9: Snort alert signatures
Page 10: Snort alert signatures
Page 11: Snort alert signatures
Page 12: Snort alert signatures
Page 13: Snort alert signatures
Page 14: Snort alert signatures
Page 15: Snort alert signatures
Page 16: Snort alert signatures

Codered Footprint

Page 17: Snort alert signatures
Page 18: Snort alert signatures
Page 19: Snort alert signatures

Nimda Footprint

Page 20: Snort alert signatures

Directory Traversal Footprint

Page 21: Snort alert signatures

Pervasive Computing Research Group Faculty of Computer Science & Information System

Universiti Teknologi Malaysia

Prof. Dr. Abdul Hanan Abdullah

Deris Stiawan