This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Questions to the functionality of Snort

Hi all,

I have here ASL last version / patches.

For the information:

it is a question in the detail of servers in the DMZ.
Some servers in the DMZ have a Snort Sensor.

For example.

In the ASL IDS rules following things are not allowed (drop).

ISAPI .ida attempt // WEB-IIS cmd.exe access 

The IDS  logging file of the ASL looks as follows.

2005:02:10-21:51:43 (none) snort[7290]: [1:1243:0] D WEB-IIS ISAPI .ida attempt [Classification: Web Application Attack] [Priority: 1]:  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:4:1] (http_inspect) BARE BYTE UNICODE ENCODING  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [1:1243:0] D WEB-IIS ISAPI .ida attempt [Classification: Web Application Attack] [Priority: 1]:  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:47 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:47 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER  {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80

And the Snort Sensor in the DMZ sees following:

#2025-(4-47325)        [cve][icat][bugtraq][arachNIDS][snort] WEB-IIS ISAPI .ida access        2005-02-10 21:51:28        24.159.16.146:4825        192.168.100.31:80        TCP     
#2026-(4-47324)        [cve][icat][bugtraq][arachNIDS][snort] WEB-IIS ISAPI .ida attempt        2005-02-10 21:51:28        24.159.16.146:4825        192.168.100.31:80        TCP     
#2027-(4-47323)        [snort] (http_inspect) NON-RFC DEFINED CHAR   2005-02-10 21:51:25        24.159.16.146:4825        192.168.100.31:80        TCP     
#2028-(4-47322)        [snort] WEB-IIS cmd.exe access     

My issues to that:

Why does the Snort Sensor see said rules in the DMZ?
Why does IDS from ASL not see this action " WEB-IIS cmd.exe access"     ?

Thx

Stefan


This thread was automatically locked due to age.
Parents Reply Children
No Data