João Mota
2006-05-11 17:39:42 UTC
-----BEGIN PGP SIGNED MESSAGE----
Hash: SHA
Hello snorters
A strange thing happened in my snort box. I'm only using snort t
block ssh brute force attacks. I'm using it with snortsam and, becaus
I couldn't patch the current snort version, I'm using the one alread
patched avaible at the snortsam web site (v 2.4.3 Build 26)
Everything was working great (26 sucessfull blocks) until yesterda
when a brute force attack was missed (doesn't show in the snort logs)
The system logs showed over 70 login failures in less than 10 minute
and I have a threshold of 5 SYN packets to the port 22 per minute. Th
rule
alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg: "BLEEDING-EDG
Potential SSH Scan"; flags: S; threshold: type threshold, trac
by_src, count 5, seconds 60; sid: 2001219; rev:12; fwsam
src[either],5min;
Another attack after that one was still detected. Does anyone have
clue why did this happened? Was there a bugfix related to this in mor
recente snort releases
Thank
- -
João Mota <***@3gnt.net
3GNTW - Tecnologias de Informação, Ld
sip: ***@3gnt.ne
jid: ***@jabber.3gnt.or
-----BEGIN PGP SIGNATURE----
Version: GnuPG v1.4.2.2 (GNU/Linux
iD8DBQFEY3beGDPTPBuCkZgRAhbcAJ9RxFAKsRh1OmnN1w9ovjHa0QweHQCfSjm
CvwHekRBoMIPlkwQ0zFb2PU
=Kzx
-----END PGP SIGNATURE----
------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security
Get stuff done quickly with pre-integrated technology to make your job easie
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronim
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=12164
______________________________________________
Snort-users mailing lis
Snort-***@lists.sourceforge.ne
Go to this URL to change user options or unsubscribe
https://lists.sourceforge.net/lists/listinfo/snort-user
Snort-users list archive
http://www.geocrawler.com/redir-sf.php3?list=snort-user
Hash: SHA
Hello snorters
A strange thing happened in my snort box. I'm only using snort t
block ssh brute force attacks. I'm using it with snortsam and, becaus
I couldn't patch the current snort version, I'm using the one alread
patched avaible at the snortsam web site (v 2.4.3 Build 26)
Everything was working great (26 sucessfull blocks) until yesterda
when a brute force attack was missed (doesn't show in the snort logs)
The system logs showed over 70 login failures in less than 10 minute
and I have a threshold of 5 SYN packets to the port 22 per minute. Th
rule
alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg: "BLEEDING-EDG
Potential SSH Scan"; flags: S; threshold: type threshold, trac
by_src, count 5, seconds 60; sid: 2001219; rev:12; fwsam
src[either],5min;
Another attack after that one was still detected. Does anyone have
clue why did this happened? Was there a bugfix related to this in mor
recente snort releases
Thank
- -
João Mota <***@3gnt.net
3GNTW - Tecnologias de Informação, Ld
sip: ***@3gnt.ne
jid: ***@jabber.3gnt.or
-----BEGIN PGP SIGNATURE----
Version: GnuPG v1.4.2.2 (GNU/Linux
iD8DBQFEY3beGDPTPBuCkZgRAhbcAJ9RxFAKsRh1OmnN1w9ovjHa0QweHQCfSjm
CvwHekRBoMIPlkwQ0zFb2PU
=Kzx
-----END PGP SIGNATURE----
------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security
Get stuff done quickly with pre-integrated technology to make your job easie
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronim
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=12164
______________________________________________
Snort-users mailing lis
Snort-***@lists.sourceforge.ne
Go to this URL to change user options or unsubscribe
https://lists.sourceforge.net/lists/listinfo/snort-user
Snort-users list archive
http://www.geocrawler.com/redir-sf.php3?list=snort-user