Snort mailing list archives

Re: [Emerging-Sigs] MS RDP on non-standard port


From: Sergey Malinkin <malinkinsa () gmail com>
Date: Mon, 23 Jan 2017 15:44:02 +0300

Hello, James.
It's correctly what i can use this rule not only for detection scan?
Initialization connect via MS RDP triggered this rule.
Thanks!

2017-01-22 17:15 GMT+03:00 James Lay <jlay () slave-tothe-box net>:

I see these scans semi regularly...usually the cookie is sometimes blank,
sometimes not:

alert tcp $EXTERNAL_NET any -> $HOME_NET !3389 (msg:"SCAN MS Terminal
Server taffic on Non-standard Port"; flow:to_server,established;
content:"|03 00 00|"; depth:3; content:"|e0 00 00 00 00 00|"; offset:5;
depth:6; content:"Cookie|3a| mstshash="; pcre:"/Cookie\x3a mstshash=/";
classtype:attempted-recon; sid:xxxxxxxx; rev:1;)

James

_______________________________________________
Emerging-sigs mailing list
Emerging-sigs () lists emergingthreats net
https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs

Support Emerging Threats! Subscribe to Emerging Threats Pro
http://www.emergingthreats.net



------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: