Snort mailing list archives
Re: capturing a suspisous traffic stream
From: "Stan Scalsky" <sscalsk () mail ameritel net>
Date: Mon, 22 Oct 2001 21:31:32 -0400
Snort can mostly do this with tags and stream4. Write a rule like this: alert tcp any any -> $HOME_NET 80 (content: "cmd.exe"; msg: "WEB
cmd.exe request"; tag: session, 300, seconds;)
and it'll capture the next 300 seconds worth of this session
that is cool and just what I was looking to do also - how about in addition to # of seconds maybe # of packets? say "tag: session, 50, packets;" to grab up to the next 50 packets. or can i already do this elsewhere? -= stan _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- capturing a suspisous traffic stream phillip mawson (Oct 22)
- Re: capturing a suspisous traffic stream Martin Roesch (Oct 22)
- Re: capturing a suspisous traffic stream Stan Scalsky (Oct 22)
- Re: capturing a suspisous traffic stream Chris Green (Oct 22)
- ip ranges? Edwin Eefting (Oct 23)
- Message not available
- ip ranges & perfomance Edwin Eefting (Oct 23)
- Re: capturing a suspisous traffic stream Stan Scalsky (Oct 22)
- Re: capturing a suspisous traffic stream Martin Roesch (Oct 22)