[Snort-sigs] BITSAdmin Upload
snort at outlook.com
Wed May 30 10:04:42 EDT 2018
Thanks for the feedback, Nick. I will put this rule on live traffic and see if I get any FPs.
From: Nick Randolph <drandolph at sourcefire.com>
Sent: Wednesday, May 30, 2018 4:24 PM
To: Y M
Subject: Re: [Snort-sigs] BITSAdmin Upload
Yaser I don't think we can include this one in the official ruleset.
On Fri, May 25, 2018 at 2:36 PM, Y M via Snort-sigs <snort-sigs at lists.snort.org<mailto:snort-sigs at lists.snort.org>> wrote:
I have only seen this used by red teamers. I am not aware of current attacks using BITSAdmin to upload stuff. I am also not aware of built-in (Windows) use either. Lab-generated pcap is available.
# Date: 2018-05-16
# Title: BITSAdmin File Upload
# Reference: Research
# Tests: pcap
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"INDICATOR-COMPROMISE Windows BITSAdmin upload request attempt"; flow:to_server,established; content:"BITS_POST"; http_method; content:"User-Agent: Microsoft BITS/"; fast_pattern:only; http_header; metadata:ruleset community, service http; classtype:misc-activity; sid:8000057; rev:1;)
Snort-sigs mailing list
Snort-sigs at lists.snort.org<mailto:Snort-sigs at lists.snort.org>
Please visit http://blog.snort.org for the latest news about Snort!
Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette
Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
nrandolph at sourcefire.com<mailto:nrandolph at sourcefire.com>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Snort-sigs