ids:rule_categories:emerging_threat_categories
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
ids:rule_categories:emerging_threat_categories [2022/01/17 10:49] – peter | ids:rule_categories:emerging_threat_categories [2022/01/17 11:00] (current) – peter | ||
---|---|---|---|
Line 46: | Line 46: | ||
|JA3|Fingerprints malicious SSL certificates using JA3 hashes.| | | |JA3|Fingerprints malicious SSL certificates using JA3 hashes.| | | ||
|::: | |::: | ||
- | |**Malware**|Malicious software.| | | + | |**Malware**|Malicious software |
|Misc|Not covered in other categories.| | | |Misc|Not covered in other categories.| | | ||
|Mobile Malware|Malware associated with mobile and tablet operating systems.| | |Mobile Malware|Malware associated with mobile and tablet operating systems.| | ||
|::: | |::: | ||
- | |NETBIOS|NetBIOS| | | + | |NETBIOS|Attacks, exploits and vulnerabilities regarding Netbios.| | |
+ | |:::|Also included are rules detecting basic activity of the protocol for logging purposes.|::: | ||
|P2P|Peer-to-Peer (P2P), including torrents, edonkey, Bittorrent, Gnutella and Limewire among others.| | |P2P|Peer-to-Peer (P2P), including torrents, edonkey, Bittorrent, Gnutella and Limewire among others.| | ||
+ | |:::|Not necessarily evil, just not appropriate for all environments.|::: | ||
|Phishing|Phishing activity.| | | |Phishing|Phishing activity.| | | ||
|Policy|May indicate violations against policies of an organization.| | | |Policy|May indicate violations against policies of an organization.| | | ||
+ | |::: | ||
|POP3|Post Office Protocol 3.0 (POP3).| | | |POP3|Post Office Protocol 3.0 (POP3).| | | ||
|RPC|Remote Procedure Call (RPC).| | |RPC|Remote Procedure Call (RPC).| | ||
Line 60: | Line 63: | ||
|SCAN|Reconnaissance and probing from tools such as Nessus, Nikto, and other port scanning tools.| | | |SCAN|Reconnaissance and probing from tools such as Nessus, Nikto, and other port scanning tools.| | | ||
|Shellcode|Remote shellcode detection.| | | |Shellcode|Remote shellcode detection.| | | ||
- | |SMTP|Simple Mail Transfer Protocol (SMTP).| | | + | |SMTP|Attacks, exploits, and vulnerabilities regarding |
- | |SNMP|Simple Network Management Protocol (SNMP).| | | + | |:::|Also includes rules detecting basic activity of the protocol for logging purposes.|::: |
- | |SQL|Structured Query Language (SQL).| | | + | |SNMP|attacks, exploits, and vulnerabilities regarding |
- | |TELNET|TELNET.| | | + | |:::|Also includes rules detecting basic activity of the protocol for logging purposes.|::: |
- | |TFTP|Trivial File Transport Protocol (TFTP).| | | + | |SQL|attacks, exploits, and vulnerabilities regarding |
+ | |:::|Also includes rules detecting basic activity of the protocol for logging purposes.|::: | ||
+ | |TELNET|attacks and vulnerabilities regarding the TELNET | ||
+ | |:::|Also includes rules detecting basic activity of the protocol for logging purposes.|::: | ||
+ | |TFTP|attacks and vulnerabilities regarding the Trivial File Transport Protocol (TFTP).| | ||
+ | |:::|Also includes rules detecting basic activity of the protocol for logging purposes.|::: | ||
|TOR|Identification of traffic to and from TOR exit nodes based on IP address.| | | |TOR|Identification of traffic to and from TOR exit nodes based on IP address.| | | ||
- | |Trojan|A legacy category not used new versions of Suricata. | + | |Trojan|A legacy category not used in new versions of Suricata. |
|User Agents|Suspicious and anomalous user agents.| | | |User Agents|Suspicious and anomalous user agents.| | | ||
|:::|Known malicious user agents are generally placed in the Malware category.| | | |:::|Known malicious user agents are generally placed in the Malware category.| | | ||
- | |VOIP|Voice over IP (VOIP) including SIP, H.323 and RTP among others.| | | + | |VOIP|Attacks and vulnerabilities regarding |
|Web Client|Web clients such as web browsers as well as client side applications like CURL, WGET and others.| | | |Web Client|Web clients such as web browsers as well as client side applications like CURL, WGET and others.| | | ||
|Web Server|Web server infrastructure such as APACHE, TOMCAT, NGINX, Microsoft Internet Information Services (IIS) and other web server software.| | | |Web Server|Web server infrastructure such as APACHE, TOMCAT, NGINX, Microsoft Internet Information Services (IIS) and other web server software.| | |
ids/rule_categories/emerging_threat_categories.1642416541.txt.gz · Last modified: 2022/01/17 10:49 by peter