Hi all,
I have here ASL last version / patches.
For the information:
it is a question in the detail of servers in the DMZ.
Some servers in the DMZ have a Snort Sensor.
For example.
In the ASL IDS rules following things are not allowed (drop).
ISAPI .ida attempt // WEB-IIS cmd.exe access
The IDS logging file of the ASL looks as follows.
2005:02:10-21:51:43 (none) snort[7290]: [1:1243:0] D WEB-IIS ISAPI .ida attempt [Classification: Web Application Attack] [Priority: 1]: {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:4:1] (http_inspect) BARE BYTE UNICODE ENCODING {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:43 (none) snort[7290]: [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [1:1243:0] D WEB-IIS ISAPI .ida attempt [Classification: Web Application Attack] [Priority: 1]: {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:44 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:47 (none) snort[7290]: [119:3:1] (http_inspect) U ENCODING {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
2005:02:10-21:51:47 (none) snort[7290]: [119:13:1] (http_inspect) NON-RFC HTTP DELIMITER {PROTO006} 24.159.16.146:4825 -> 192.168.100.31:80
And the Snort Sensor in the DMZ sees following:
#2025-(4-47325) [cve][icat][bugtraq][arachNIDS][snort] WEB-IIS ISAPI .ida access 2005-02-10 21:51:28 24.159.16.146:4825 192.168.100.31:80 TCP
#2026-(4-47324) [cve][icat][bugtraq][arachNIDS][snort] WEB-IIS ISAPI .ida attempt 2005-02-10 21:51:28 24.159.16.146:4825 192.168.100.31:80 TCP
#2027-(4-47323) [snort] (http_inspect) NON-RFC DEFINED CHAR 2005-02-10 21:51:25 24.159.16.146:4825 192.168.100.31:80 TCP
#2028-(4-47322) [snort] WEB-IIS cmd.exe access
My issues to that:
Why does the Snort Sensor see said rules in the DMZ?
Why does IDS from ASL not see this action " WEB-IIS cmd.exe access" ?
Thx
Stefan
This thread was automatically locked due to age.