Snort mailing list archives

Re: BITSAdmin Upload


From: Nick Randolph <drandolph () sourcefire com>
Date: Wed, 30 May 2018 09:24:34 -0400

Yaser I don't think we can include this one in the official ruleset.

https://msdn.microsoft.com/en-us/library/windows/desktop/aa363160(v=vs.85).aspx

On Fri, May 25, 2018 at 2:36 PM, Y M via Snort-sigs <
snort-sigs () lists snort org> wrote:

Hi,

I have only seen this used by red teamers. I am not aware of current
attacks using BITSAdmin to upload stuff. I am also not aware of built-in
(Windows) use either. Lab-generated pcap is available.

# --------------------
# Date: 2018-05-16
# Title: BITSAdmin File Upload
# Reference: Research
# Tests: pcap

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS
(msg:"INDICATOR-COMPROMISE Windows BITSAdmin upload request attempt";
flow:to_server,established; content:"BITS_POST"; http_method;
content:"User-Agent: Microsoft BITS/"; fast_pattern:only; http_header;
metadata:ruleset community, service http; classtype:misc-activity;
sid:8000057; rev:1;)

Thanks.
YM

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-
the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure
to stay up to date to catch the most <a href="
https://snort.org/downloads/#rule-downloads";>emerging threats</a>!




-- 

Nick Randolph
Research Engineer
Sourcefire, Inc.
nrandolph () sourcefire com
Sourcefire.com <http://www.sourcefire.com/>
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: