Hey, I use the dhcp analyzer because i cannot count on our dhcp logs. Not just 
that, I do some detection around it.

> On Jun 15, 2018, at 2:38 PM, Vlad Grigorescu <v...@es.net> wrote:
> 
> Yeah, I've mainly seen it used for shellshock. On top of that, I saw some 
> scripts in GitHub that used it from:
> 
> - Michal: 
> https://github.com/michalpurzynski/bro-gramming/blob/master/dhcpr.bro
> - Matthias: https://github.com/bro/bro-scripts/blob/master/roam.bro
> - Grant Stavely: 
> https://github.com/evernote/bro-scripts/blob/master/bolo/scripts/main.bro
> - Anthony: https://github.com/anthonykasza/users/blob/master/users.bro
> 
> (There were a few others, like IVRE, but they've already updated).
> 
> Even if it's not widely used, I think it'd be a nicer user experience if we 
> were to ship a script that handled dhcp_message, and raised the old events. 
> We could mark the old events as deprecated, and remove them in the next 
> version. That way, people have at least one cycle to upgrade.
> 
> Hopefully, as we see more published Bro packages, we have a better idea of 
> which events are/aren't being used.
> 
>   --Vlad
> 
>> On Fri, Jun 15, 2018 at 9:22 PM, Azoff, Justin S <jaz...@illinois.edu> wrote:
>> > On Jun 15, 2018, at 5:18 PM, Seth Hall <s...@corelight.com> wrote:
>> > 
>> >  On the 
>> > upside, you can handle both the old events and the new and they 
>> > shouldn't impact each other (if you want to make a script work on 
>> > multiple releases).
>> 
>> I ran into this on a script I got from somewhere, bash-cve-2014-6271.bro
>> 
>> The fix is a little trickier, you can't handle both events because the 
>> DHCP::Msg type no longer exists and you need to wrap the old event with
>> 
>> @ifdef (DHCP::Msg)
>> @endif
>> 
>> So for that script I ended up with
>> 
>> @ifdef (DHCP::Msg)
>> event dhcp_message(c: connection, is_orig: bool, msg: DHCP::Msg, options: 
>> DHCP::Options)
>> {
>>         if ( options?$host_name && shellshock in options$host_name )
>>                         NOTICE([$note=Bash::DHCP_hostname_Attack,
>>                                 $conn=c,
>>                                 $msg=fmt("%s may have attempted to exploit 
>> CVE-2014-6271, bash environment variable attack, via dhcp hostname against 
>> %s submitting \"hostname\"=\"%s\"",c$id$orig_h, c$id$resp_h, 
>> options$host_name),
>>                                 $identifier=c$uid]);
>> }
>> @else
>> event dhcp_offer(c: connection, msg: dhcp_msg, mask: addr, router: 
>> dhcp_router_list, lease: interval, serv_addr: addr, host_name: string)
>> {
>>         if ( shellshock in host_name )
>>                         NOTICE([$note=Bash::DHCP_hostname_Attack,
>>                                 $conn=c,
>>                                 $msg=fmt("%s may have attempted to exploit 
>> CVE-2014-6271, bash environment variable attack, via dhcp hostname against 
>> %s submitting \"hostname\"=\"%s\"",c$id$orig_h, c$id$resp_h, host_name),
>>                                 $identifier=c$uid]);
>> }
>> @endif
>> 
>> 
>> 
>> — 
>> Justin Azoff
>> 
>> 
>> 
>> _______________________________________________
>> bro-dev mailing list
>> bro-dev@bro.org
>> http://mailman.icsi.berkeley.edu/mailman/listinfo/bro-dev
> 
> _______________________________________________
> bro-dev mailing list
> bro-dev@bro.org
> http://mailman.icsi.berkeley.edu/mailman/listinfo/bro-dev
_______________________________________________
bro-dev mailing list
bro-dev@bro.org
http://mailman.icsi.berkeley.edu/mailman/listinfo/bro-dev

Reply via email to