[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Snort Question



Daniel,

Thanks for your helpful response.  I also received a response from
Nigel Houghton on the snort users list to tell me how to interpret
the codes  [119:16:1], [119:15:1], and [119:2:1].  They can be found in
/etc/snort/sid-msg.map.  As an example, [119:16:1] means:

   generator id: 119 or http_inspect
   snort id :       16 or OVERSIZE CHUNK ENCODING
   revision:        1 (all revisions are currently 1)

to look it up on the snort id database, use the URL:

 http://www.snort.org/snort-db/sid.html?sid=119-16

On Mon, 27 Sep 2004 07:24 pm, Daniel Pittman wrote:
> On 27 Sep 2004, James Sinnamon wrote:
> > I haven't yet had much joy from a question, further below, which I sent
> > to the Snort mailing list. Can anyone help? Any response would be
> > appreciated, even if only to politely say that the question is too stupid
> > to warrant a response.
>
> [...]
>
> > I have had Snort running since May on a Debian Linux system, but I still
> > do not know how to use the information in /var/log/snort/alert*. I bought
> > "Snort for Dummies" to kick start myself, but the description of the
> > alert records does not correspond to what I find on my system.
>
> You may well find that the book, being paper and thus prone to getting
> outdated, no longer matches up with the version of Snort in Debian.
>
> Alternately, it may be that Debian in stable is older than the book. :)
>
> [...]
>
> > [**] [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING [**]
> > 09/27-08:39:21.347580 147.16.81.75:32999 -> 203.26.51.42:80 TCP TTL:63
> > TOS:0x0 ID:57676 IpLen:20 DgmLen:1272 DF ***AP*** Seq: 0xF0F14CE9 Ack:
> > 0xF0CED3A Win: 0x16D0 TcpLen: 32 TCP Options (3) => NOP NOP TS: 175525
> > 948682168
> >

<snip/>

> >
> > ... do the above records contain snort ID's? The closest I can find are:
> > [119:16:1], [119:15:1], and [119:2:1].
>
> I cannot help you there, I fear.
>
> > Also, I am not sure which of the port pairs is meant to be the source and
> > which is meant to be the destination. Are the above, records of :
> >
> > 1) attempts to hack into my system (147.16.81.75), or
> > 2) attempts by processes on my system to hack into other
> > systems (203.26.51.42, 202.139.107.20, 202.139.106.174)?
>
> The direction of the arrow (->) is a hint, I suspect. :)
>
> Those are all HTTP based attacks, so the fact that they come from the
> 147.* address on a high port and go to your systems on port 80 would
> also seem a bit of a hint.
>
> So, the answer is that they are the source host and port on the left,
> then the destination host and port on the right.
>
> These represent some sort of automatic attack on your system, most
> likely.

Also, most of the 'attacks' are originating from
my own network.  These are possibly some quirks with 
Mozilla Firefox, or else from some downloaded pages.
Possibly I don't need ot be too concerned about these.
Maybe should try to change the rules to omit these sorts
of messges from /var/log/snort/alert

So, I have now some better grasp of the basics of Snort.

Thanks again,

regards,

James


-- 
James Sinnamon
frodo000@bigpond net au 
+61 412 319669, +61 2 95692123



Reply to: