[Snort-users] How to detect http response body

Maxim hittlle at ...7427...
Wed Nov 2 21:27:47 EDT 2016


It's response body, not request body





--
发自我的网易邮箱手机智能版



在 2016-11-02 20:04:45,"Y M" <snort at ...15979...> 写道:

Have you tried using the content modifier "http_client_body"? Also, If the string constantly appears at fixed offset, you can further optimize with content modifiers "offset" and "depth". These are all part of the documentation.


http://manual-snort-org.s3-website-us-east-1.amazonaws.com/node32.html#SECTION004511000000000000000


YM








On Wed, Nov 2, 2016 at 2:14 PM +0300, "Maxim" <hittlle at ...7427...> wrote:


Hi all,
We came across a weird scenario. We used the following rule to detect http response body
  alert tcp any any -> $HOME_NET any ( sid: 10000003; file_data; content:"ASED"; nocase; rev:1; classtype: misc-activity;msg:"cve-test";)
And we do see such a string in the response body, but snort did not trigger any alerts. Are we missing anything? Many thanks




 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-users/attachments/20161103/15e86160/attachment.html>


More information about the Snort-users mailing list