Snort mailing list archives

Re: Rules for ssh exploit


From: Fyodor <fygrave () tigerteam net>
Date: Mon, 12 Nov 2001 11:45:57 +0700

On Mon, Nov 12, 2001 at 10:57:15AM +0100, Ralf Hildebrandt wrote:
On Fri, Nov 02, 2001 at 04:34:57PM +1300, Russell Fulton wrote:

    Does any one have snort rules for detecting the recent spate of 
ssh attacks or are all the usable fingerprints hidden by the encryption?

http://staff.washington.edu/dittrich/misc/ssh-analysis.txt


It is actually quite hard to catch ssh exploit attempt with simple
pkt-matching signature. IMHO this is the place where definetely a
protocol analysis would make more sense. Different exploits that I have
seen, look quite different from network layer perspective..

_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: