Snort mailing list archives

Re: Detecting TCP session without data after three-wayhandshake


From: Martin Holste <mcholste () gmail com>
Date: Fri, 4 Nov 2011 07:51:23 -0500

3. the bots are scraping initial HTTPS SSL exchanges and capturing FQDNs
- that's what I'm guessing

Whether or not that's definitely what happened in your case, it
certainly could've been.  I wonder how many people have sensitive
intranet hostnames sitting in their certs for the world to see?

I learnt one thing: if you make a legitimate SSL transaction against an
HTTPS server (to scrape the public cert) - APACHE WON'T LOG ANYTHING -

You can probably tweak that in the config, but since most go with the
default, it's very worth noting.  Thanks for pointing this out.

------------------------------------------------------------------------------
RSA(R) Conference 2012
Save $700 by Nov 18
Register now
http://p.sf.net/sfu/rsa-sfdev2dev1
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!


Current thread: