Gostaria que pudessem me falar a respeito dessas regras se ficarão boas ou
necessita modificações ???



# Regra para Ataque Shellcode x86 NOOP

<rule>

ip dst(www)

tcp dst(137)

message=(flood buffer) ShellCode attack - Sirlene

action=action1

</rule>



<rule>

ip dst(www)

udp dst(137)

message=(flood buffer) ShellCode attack - Sirlene

action=action1

</rule>







# Regra para Ataque OpenPort

<rule>

ip dst(www)

tcp dst(80)

tcp regex (^Open[ ]Port:[ ]\(80\|22\).)

message=(portscan) attack

action=action1

</rule>







# Regra para Ataque MS-SQL version overflow attempt



<rule>

ip dst(www)

tcp dst(1433)

message=(MsSQL) attack

action=action1

</rule>



<rule>

ip dst(www)

tcp dst(1434)

message=(MsSQL) attack

action=action1

</rule>











# Regra para Ataque ICMP PING e Echo Reply

<rule>

ip dst(www)

tcp dst(80)

tcp regex (^[¬]\{36})

message=(Icmp-1) attack

action=action1

</rule>



<rule>

ip dst(www)

tcp dst(80)

tcp regex (^Ba[a-z]*w[a-z]\{1,9})

message=(Icmp-2) attack

action=action1

</rule>











# Regra para Ataque IcmpDestination

<rule>

ip dst(www)

tcp dst(80)

tcp regex (^.\{176}\(STOP!\).\{18}\(IMMEDITE\)[
]\(ATTENTION\).\{203}\(www\.regfixit\.com\).\{1,111})

message=(IcmpDestination-1) attack

action=action1

</rule>



<rule>

ip dst(www)

tcp dst(80)

tcp regex (^.\{176}\(STOP!\).\{20}\(IMMEDIATE\)[
]\(ATTENTION\).\{148}\(www\.nowfixpc\.com\).\{1,164})

message=(IcmpDestination-2) attack

action=action1

</rule>



<rule>

ip dst(www)

tcp dst(80)

tcp regex (^.\{120}\(SYSTEM\).\{22}\(ALERT\).\{23}\(your system registry is
corrupted\).\{1,339})

message=(IcmpDestination-3) attack

action=action1

</rule>




-- 
Danilo Marques
Sistemas de Informação
Mineiros - GO



-- 
Danilo Marques
Sistemas de Informação
Mineiros - GO
# Regra para Ataque Shellcode x86 NOOP
<rule>
ip dst(www)
tcp dst(137)
message=(flood buffer) ShellCode attack - Sirlene
action=action1
</rule>

<rule>
ip dst(www)
udp dst(137)
message=(flood buffer) ShellCode attack - Sirlene
action=action1
</rule>



# Regra para Ataque OpenPort
<rule>
ip dst(www)
tcp dst(80)
tcp regex (^Open[ ]Port:[ ]\(80\|22\).)
message=(portscan) attack
action=action1
</rule>



# Regra para Ataque MS-SQL version overflow attempt

<rule>
ip dst(www)
tcp dst(1433)
message=(MsSQL) attack
action=action1
</rule>

<rule>
ip dst(www)
tcp dst(1434)
message=(MsSQL) attack
action=action1
</rule>





# Regra para Ataque ICMP PING e Echo Reply
<rule>
ip dst(www)
tcp dst(80)
tcp regex (^[¬]\{36})
message=(Icmp-1) attack
action=action1
</rule>

<rule>
ip dst(www)
tcp dst(80)
tcp regex (^Ba[a-z]*w[a-z]\{1,9})
message=(Icmp-2) attack
action=action1
</rule>





# Regra para Ataque IcmpDestination
<rule>
ip dst(www)
tcp dst(80)
tcp regex (^.\{176}\(STOP!\).\{18}\(IMMEDITE\)[ 
]\(ATTENTION\).\{203}\(www\.regfixit\.com\).\{1,111})
message=(IcmpDestination-1) attack
action=action1
</rule>

<rule>
ip dst(www)
tcp dst(80)
tcp regex (^.\{176}\(STOP!\).\{20}\(IMMEDIATE\)[ 
]\(ATTENTION\).\{148}\(www\.nowfixpc\.com\).\{1,164})
message=(IcmpDestination-2) attack
action=action1
</rule>

<rule>
ip dst(www)
tcp dst(80)
tcp regex (^.\{120}\(SYSTEM\).\{22}\(ALERT\).\{23}\(your system registry is 
corrupted\).\{1,339})
message=(IcmpDestination-3) attack
action=action1
</rule>







Responder a