[Snort-users] Re: Snort-users digest, Vol 1 #1442 - 1 msg
joe at ...3851...
Wed Jan 2 07:44:04 EST 2002
This was originally posted by Mr. Roesch hisownself back in October to answer a similar query.
(in this case, being triggered by a "cmd.exe" http rule triggers a 300 second traffic grab to
catch the rest of the converstaion..)
Subject: Re: [Snort-users] capturing a suspisous traffic stream
Snort can mostly do this with tags and stream4. Write a rule like this:
alert tcp any any -> $HOME_NET 80 \
(content: "cmd.exe"; \
msg: "WEB cmd.exe request"; \
tag: session, 300, seconds;)
and it'll capture the next 300 seconds worth of this session. If you're
running stream4 and logging in -b mode, it'll also cause stream4 to dump
out the packet cache for that session when it detects the alert has gone
off, which will record some limited information about what came before
the attack packet as well (in build 81 and higher).
Not quite 100%, but getting there...
..I liked it so much that I archived it.. ;-)
>>> <snort-users-request at lists.sourceforge.net> 01/01/02 03:17PM >>>
Send Snort-users mailing list submissions to
snort-users at lists.sourceforge.net
To subscribe or unsubscribe via the World Wide Web, visit
or, via email, send a message with subject or body 'help' to
snort-users-request at lists.sourceforge.net
You can reach the person managing the list at
snort-users-admin at lists.sourceforge.net
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Snort-users digest..."
1. Help needed: Performance Check & Traffic Capture (Marc Dreher)
Date: Tue, 1 Jan 2002 15:47:49 +0100 (MET)
From: Marc Dreher <MarcDreher at ...158...>
To: snort-users at ...314...
Subject: [Snort-users] Help needed: Performance Check & Traffic Capture
first, happy new year to everybody :-)
Now my questions. I have played with snort a bit and like it very much and
currently there are two issues I could not get an answer for so far.
1) Is it possible to check snorts performance (if packets are dropped,how
many) while running it in IDS mode. Running in packet logger mode I get this
information but I think performance is quite a bit lower when running in IDS
mode and logging to a database.
2) Also about IDS mode. Often I think it would be very usefull if I had the
traffic preceeding and following an alert, and not only the packet which
caused the alert. Fast logging format would be enough. Is there a recomended way
or possibility to achive this in IDS mode or do I have to run a second
instance of snort for this (which wouldn't do performance to good I guess)
Sorry if these questions have been posted before but I didn't find an easy
way to search the archive at geocrawler (is there one?)
Thanks for any help
GMX - Die Kommunikationsplattform im Internet.
Snort-users mailing list
Snort-users at lists.sourceforge.net
End of Snort-users Digest
More information about the Snort-users