[Snort-users] Rules to block FT
frank at ...9761...
Tue Jul 24 20:12:45 EDT 2007
On Thu, 2007-06-28 at 13:27 -0500, Atkins, Dwane P wrote:
> They seem to both work.
Not so quick :)
> I think what Dwane is looking for is ftp brute force attempts against
> his own ftp servers, so this should do it:
> alert tcp $HOME_NET 21 -> $EXTERNAL_NET any
Make sure you are blocking DST in this rule, not SRC, if you want to
In your old rule:
> > alert tcp $HOME_NET any -> $EXTERNAL_NET 21 ( msg:"BLOCKED
> > FTP Brute-Force attempt";flow:from_server,established;
> > content:"530 ";
> > pcre:"/^530\s+(Login|User|Failed)/smi";classtype:unsuccessful-user;
> > threshold: type threshold, track by_dst, count 10, seconds 60;
> > sid:1000002; rev:1; fwsam: src, 5 minutes;)
You had SRC listed, which is correct for HOME_NET (since it is a client
in this rule, and I assume you wanted to block your rogue client PC on
the inside ;)
Remember that SRC blocks the host LEFT of -> and DST blocks the host to
the RIGHT of ->
It is said that the Internet is a public utility. As such, it is best
compared to a sewer. A big, fat pipe with a bunch of crap sloshing
against your ports.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 187 bytes
Desc: This is a digitally signed message part
More information about the Snort-users