Snort mailing list archives

Re: which rules to load ?


From: Peter Bates <peter.bates () ucl ac uk>
Date: Wed, 29 Aug 2012 13:11:58 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hello all

On 29/08/2012 12:07, Pratik Narang wrote:
Is there anyone out there running who is Snort for a commercial 
environment or at least for a medium sized network? How does one 
shortlist on the .rules files to be used and the rules (in them) to
be enabled ??

A lot of advice on this topic is best expressed as 'know your network'.
If you have no inbound telnet or ftp then telnet.rules and ftp.rules
are not so much use.

There are currently 3081 VRT rules enabled by default - if you have a
fair amount of RAM I'd suggest running them all and seeing what you get.

I'd then suggest you use Pulledpork to manage your rules and put the
ones that are leading to FPs in disablesid.conf.

When PP logs some new rules, look at them and evaluate whether they
are applicable to your environment, for example, from this morning for me:

- -=BEGIN PULLEDPORK SNORT RULES CHANGELOG, Tracking started on Wed Aug
29 05:45:3
1 2012 GMT=-

- -=Begin Changes Logged for Wed Aug 29 05:45:31 2012 GMT=-

New Rules
        BACKDOOR Trojan.Kryptik.Kazy runtime detection (1:23987)
        BOTNET-CNC Trojan.Dropper connect to server attempt (1:23978)
<snip>
        EXPLOIT HP Data Protector Express stack buffer overflow
attempt (1:23979)

If you know you don't run HP Data Protector, you can just add those
new rules to your disablesid.conf.

The difficulty of course lies in whether you know you run an
application or not. I don't think there's a magic bullet.

- -- 
Peter Bates
Senior Computer Security Officer    Phone: +44(0)2076792049
Information Services Division       Internal Ext: 32049
University College London
London WC1E 6BT
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iQEcBAEBAgAGBQJQPgcOAAoJELhVoVpEMS6Rl+kIAIIvrhy7qmawyeQVyQSF+Y5u
7/9q+Tr0FCVA8FFglY8jrnLCjCwZkwr1zRZ2jCzXh0EQ3jKDKZ+9lsRncpkimdyp
BDCn9fWR0I+RfJhcuIRWtGnIX1QlvNEEVzWEMB/MsDypSYUhnDgNsUbKmOyJiJ3/
xfnhMeQxtlz93K7ngp2gn9d4az9lHhm91gIUpo6rIbQHc368ONMq8XI9pZTstNA7
sVe1+SMmE2Y617TofRkaeeupRCX5i+vp7oSipw3vuJTHGJNq9ubK8+LFmWKIj+cg
tpux+gNI3T3geSN4TLmA4EYN3G06PbCPua1NXmUlwOQq3oXzmyuH4ZBySFiBZHA=
=pdOu
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!


Current thread: