[Snort-sigs] Avoidance of 1861.7 (WEB-MISC Linksys router default username and password login attempt)

nnposter at ...592... nnposter at ...592...
Fri Jul 2 22:24:00 EDT 2004


Rule:  WEB-MISC Linksys router default username and password login attempt

--
Sid: 1861

--
False Negatives:
Current version of the rule incorrectly assumes specific spacing. 
As a result, an attacker can easily get around the signature.

See http://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2
See http://www.ietf.org/rfc/rfc2617.txt


I am proposing to convert the authentication clause to PCRE:

alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 
(msg:"WEB-MISC Linksys router default username and password login attempt"; 
flow:to_server,established; content:"YWRtaW46YWRtaW4"; 
pcre:"/^Authorization\x3a\s*Basic +(?-i)YWRtaW46YWRtaW4/mi"; 
reference:nessus,10999; classtype:default-login-attempt; sid:1861; rev:8;)




More information about the Snort-sigs mailing list