Snort mailing list archives

Re: [WARNING: UNSCANNABLE EXTRACTION FAILED] Snort not detect attack on mirroring port


From: Dorian ROSSE via Snort-users <snort-users () lists snort org>
Date: Sun, 16 Jun 2019 12:48:48 +0000

For tcpdump and pcap between Itself in snort follow It two links :

https://opensourceforu.com/2015/04/make-your-network-secure-with-pcap-and-snort/

https://www.linuxtechi.com/capture-analyze-packets-tcpdump-command-linux/

I hope It will be helpful,

Regards.


Dorian ROSSE.

Provenance : Courrier<https://go.microsoft.com/fwlink/?LinkId=550986> pour Windows 10

________________________________
De : Snort-users <snort-users-bounces () lists snort org> de la part de Al Lewis (allewi) via Snort-users <snort-users 
() lists snort org>
Envoyé : Saturday, June 15, 2019 4:52:14 PM
À : Сергей Беляев; snort-users () lists snort org
Objet : Re: [Snort-users] [WARNING: UNSCANNABLE EXTRACTION FAILED] Snort not detect attack on mirroring port

Hello,

Are you able to capture the traffic (using tcpdump) in the scenario that doesn’t alert?

If so, as a quick test, are you able to replay that captured traffic directly into snort (using -r )? Do you get alerts 
then?

Are you able to share the pcaps of the working vs non working sessions?


Albert Lewis
ENGINEER.SOFTWARE ENGINEERING
Cisco Systems Inc.
Email: allewi () cisco com<mailto:allewi () cisco com>



From: Snort-users <snort-users-bounces () lists snort org> on behalf of Сергей Беляев via Snort-users <snort-users () 
lists snort org>
Reply-To: Сергей Беляев <bamkrgd () mail ru>
Date: Saturday, June 15, 2019 at 9:26 AM
To: "snort-users () lists snort org" <snort-users () lists snort org>
Subject: [WARNING: UNSCANNABLE EXTRACTION FAILED][Snort-users] Snort not detect attack on mirroring port

Hellow.
  Excuse me for my bad english.
  I Iinstall snort 2.9.11 on ubuntu 12.04 from sources and connect it to HP ProCurve 2510G mirror port.
  My mirroring scheme in file mirror.pdf and snort host configuration in file snort_host_conf.png
  I tried attack my test windows xp machine from kali by script ms_08_067_netapi.rb, which exploits cve-2008-4250 
vulnerability. And snort not detect it.
  Then i tried the same attack from  kali to windows xp via linux in routing mode - scheme snort_on_router.pdf
  And in this scheme snort detect attacks successfully by triggering rule sid 14782 in file os-windows.rules
  My snort config in snort.tar.gz
  May be it is bag that snort not detect attack from mirroring traffic?
  Installing snort 2.9.13 to ubuntu 16.04 - same result.


Sergey
_______________________________________________
Snort-users mailing list
Snort-users () lists snort org
Go to this URL to change user options or unsubscribe:
https://lists.snort.org/mailman/listinfo/snort-users

        To unsubscribe, send an email to:
        snort-users-leave () lists snort org

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Current thread: