[Snort-sigs] [Emerging-Sigs] MS RDP on non-standard port

Sergey Malinkin malinkinsa at ...2420...
Mon Jan 23 07:44:02 EST 2017


Hello, James.
It's correctly what i can use this rule not only for detection scan?
Initialization connect via MS RDP triggered this rule.
Thanks!

2017-01-22 17:15 GMT+03:00 James Lay <jlay at ...3266...>:

> I see these scans semi regularly...usually the cookie is sometimes blank,
> sometimes not:
>
> alert tcp $EXTERNAL_NET any -> $HOME_NET !3389 (msg:"SCAN MS Terminal
> Server taffic on Non-standard Port"; flow:to_server,established;
> content:"|03 00 00|"; depth:3; content:"|e0 00 00 00 00 00|"; offset:5;
> depth:6; content:"Cookie|3a| mstshash="; pcre:"/Cookie\x3a mstshash=/";
> classtype:attempted-recon; sid:xxxxxxxx; rev:1;)
>
> James
>
> _______________________________________________
> Emerging-sigs mailing list
> Emerging-sigs at ...3694...
> https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
>
> Support Emerging Threats! Subscribe to Emerging Threats Pro
> http://www.emergingthreats.net
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20170123/f8166b9e/attachment.html>


More information about the Snort-sigs mailing list