Snort mailing list archives

Re: HTTP interception/injection


From: Phillip Lee <phillile () sourcefire com>
Date: Wed, 14 Mar 2018 14:45:37 -0400

Yaser,

Thanks for your submission. We will review the rules and get back to you when they're finished. 

Regards,
Phil Lee
Cisco Talos

On Mar 14, 2018, at 2:36 PM, Y M via Snort-sigs <snort-sigs () lists snort org> wrote:

Hi,

The below rules are based of CitizenLab report "Bad Traffic". The pcaps are available at the GitHub resource.

alert tcp $EXTERNAL_NET 80 -> $HOME_NET  any (msg:"MALWARE-OTHER device-specific generic injected HTTP response"; 
flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect"; content:"Location|3A 20|"; 
content:"Connection|3A 20|close"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; metadata:ruleset community, 
service http; 
reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria 
<http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; 
reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; 
sid:9000040; rev:1;)

alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"MALWARE-OTHER device-specific file download injected HTTP 
response"; flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect|0A|"; content:"Location|3A 
20|"; content:"Connection|3A 20|close|0A|"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; 
pcre:"/Location\x3a\x20.+\.php\x3f[a-z]\x3d[a-f0-9]{64}\x0a/i"; metadata:ruleset community, service http; 
reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria 
<http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; 
reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; 
sid:9000041; rev:1;)

alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"MALWARE-OTHER device-specific AdHose injected HTTP response"; 
flow:to_client,established; id:13330; flags:FA; content:"307 Temporary Redirect|0D 0A|"; content:"Location|3A 20|"; 
content:"Connection|3A 20|close|0D 0A|"; content:!"Content-Type|3A 20|"; content:!"Date|3A 20|"; 
pcre:"/Location\x3a\x20.+\.html\x0d\x0a/i"; metadata:ruleset community, service http; 
reference:url,citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria 
<http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria>; 
reference:url,github.com/citizenlab/badtraffic <http://github.com/citizenlab/badtraffic>; classtype:trojan-activity; 
sid:9000042; rev:1;)

Thanks.
YM

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org <mailto:Snort-sigs () lists snort org>
https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>

Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette 
<https://snort.org/faq/what-is-the-mailing-list-etiquette>

Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to 
catch the most <a href=" https://snort.org/downloads/#rule-downloads 
<https://snort.org/downloads/#rule-downloads>">emerging threats</a>!

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: