The BlackICE/Sentry products do NOT detect sapphire as ISS felt it best not to update 
that product line. The following SQL scripts will find all UDP 1434 port probes from 
the past hour. They work well for me, but use at your own risk, I am not responsible 
for your actions or results, blah blah.  They must be run from a MS Query Analizer 
window, a SQL tool installed with SQL server. The icecap SQL window does not like 
these.

-Tom

---- Summary of Active Systems, past hour
Select intr.bestName as 'IntruderName',
        intr.networkAddress as 'IntruderIP',
        intr.loccode,
        count(*)
FROM iceevents ie
        JOIN host intr ON ie.intruderID = intr.hostID
        LEFT JOIN eventParameters ep ON ep.EventID = ie.eventid 
WHERE ie.issuename = 'udp port probe' and ep.paramvalue = '1434'
        and ie.startTime > dateadd(minute,-60,getdate())
GROUP BY intr.bestname, intr.networkaddress
ORDER BY count(*) desc


--- Details of active systems
Select ie.startTime as 'StartTime',
        ie.EndTime as 'EndTime',
        intr.bestName as 'IntruderName',
        intr.networkAddress as 'IntruderIP',
        targ.bestname as 'TargetName',
        targ.networkAddress as 'TargetIP',
        det.BestName as 'Detector',
        a.accountName as 'AccountName', 
        pg.groupName as 'GroupName',
        ie.IssueName as 'IssueName',
        ep.ParamName as 'Parameter',
        ep.ParamValue as 'Value'

FROM iceevents ie
        JOIN host det ON ie.detectorID = det.hostID 
        JOIN host intr ON ie.intruderID = intr.hostID 
        JOIN host targ ON ie.targetID = targ.hostID 
        LEFT JOIN eventParameters ep ON ep.EventID = ie.eventid 
        JOIN account a ON a.accountID = det.AccountID 
        JOIN icecapagent ia ON det.hostid = ia.agenthostid  
        JOIN policygroup pg ON ia.agentgroupid = pg.groupid 

WHERE ie.startTime >= dateadd(hour,-1,getdate())
        and ie.issuename = 'UDP Port Probe'
        and ep.paramValue = '1434'

ORDER BY ie.StartTime desc



-----Original Message-----
From: Rouland, Chris (ISSAtlanta) [mailto:[EMAIL PROTECTED]]
Sent: Sunday, January 26, 2003 2:28 PM
To: Christopher Lyon; [EMAIL PROTECTED]
Subject: RE: [ISSForum] SQL Slammer


Christopher,

The RealSecure network sensor signature that shipped in RealSecure XPUs
20.4/5.3 on 9/17/02 which detects the exploit being used by the SQL
Slammer worm is named SQL_SSRP_StackBo.

-Chris

-----Original Message-----
From: Christopher Lyon [mailto:[EMAIL PROTECTED]] 
Sent: Sunday, January 26, 2003 4:37 AM
To: [EMAIL PROTECTED]
Subject: [ISSForum] SQL Slammer


According to ISS' home page the sensors can detect this as of September
2002. I did a search for it on the signature base that I have but can't
seem to find it. I tried both Slammer and SQLExp. Does it use a
different name?


_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to
https://atla-mm1.iss.net/mailman/listinfo
_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo
_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo

Reply via email to