Snort mailing list archives

Re: Noction IRP Probe sig


From: Joshua Williams <joshuwi2 () sourcefire com>
Date: Wed, 14 Dec 2016 10:33:39 -0500

James,

Thanks for your submission. I'll review and test this and get back to you
when it has finished.

--
Josh Williams
Detection Response Team
TALOS Security Group

On Wed, Dec 14, 2016 at 10:20 AM, James Lay <jlay () slave-tothe-box net>
wrote:

Been seeing these for months..they hit on data on syn packet, figured
I'd sig it up:

alert tcp $EXTERNAL_NET any -> $HOME_NET 33434 (msg:"INFO Noction IRP
Probe"; flow:stateless; flags:SP; content:"|4E4F4354494F4E20495250|";
classtype:bad-unknown; reference:url,www.noction.com/faq;sid:10000242;
rev:1;)

James

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure
to stay up to date to catch the most <a href="
https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: