ids:rule_categories:snort_rule_set_categories
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ids:rule_categories:snort_rule_set_categories [2021/07/24 11:18] – peter | ids:rule_categories:snort_rule_set_categories [2021/07/24 12:22] (current) – peter | ||
---|---|---|---|
Line 3: | Line 3: | ||
<WRAP info> | <WRAP info> | ||
**NOTE: | **NOTE: | ||
+ | |||
+ | * **Policy**: | ||
+ | * **Depreciated**: | ||
</ | </ | ||
Line 8: | Line 11: | ||
Protects against attacks and exploits of: | Protects against attacks and exploits of: | ||
- | ^Category^Description^ | + | ^Category^Description^Policy^Depreciated^ |
|app-detect|Applications that generate network activity.| | |app-detect|Applications that generate network activity.| | ||
- | |attack-responses|Usually occurs after a machine has been compromised.| | + | |attack-responses|Usually occurs after a machine has been compromised.| |Y| |
- | |backdoor|Trojan activity; the target machine may already be compromised.| | + | |backdoor|Backdoor |
- | |bad-traffic|Traffic that should never be seen on any network.| | + | |bad-traffic|Traffic that should never be seen on any network, such as TCP and UDP port 0 traffic, or a SYN packet to a multicast address.| |Y| |
|blacklist|URI, | |blacklist|URI, | ||
- | |botnet-cnc|Botnets.| | + | |botnet-cnc|Botnets.| |Y| |
|browser-chrome|Chrome browser vulnerabilities.| | |browser-chrome|Chrome browser vulnerabilities.| | ||
|:::|This is separate from the **browser-webkit** category, as Chrome has enough vulnerabilities itself.| | |:::|This is separate from the **browser-webkit** category, as Chrome has enough vulnerabilities itself.| | ||
Line 24: | Line 27: | ||
|browser-other|Other browser vulnerabilities not listed above.| | |browser-other|Other browser vulnerabilities not listed above.| | ||
|browser-plugins|Browser plugin vulnerabilities, | |browser-plugins|Browser plugin vulnerabilities, | ||
- | |chat|Chat programs, such as AIM, ICQ, and IRC, which may be against corporate policy.| | + | |chat|Chat programs, such as AIM, ICQ, and IRC, which may be against corporate policy.|Y|Y| |
|content-replace|Any rule that utilizes the **replace** functionality inside of Snort.| | |content-replace|Any rule that utilizes the **replace** functionality inside of Snort.| | ||
- | |ddos|Distributed denial of service (DDoS).| | + | |ddos|Distributed denial of service (DDoS).| |Y| |
- | |deleted|Deprecated or superseeded | + | |deleted|Deprecated or super-seeded |
- | |dos|Denial of service (DoS).| | + | |dns|DNS, including detection of zone transfers.| |Y| |
- | |experimental|Experimental rules.| | + | |dos|Denial of service (DoS), including IGMP and teardrop attacks.| |Y| |
- | |exploit|An older category which will be deprecated soon. This category looks for exploits against software in a generic form.| | + | |experimental|Experimental rules, mostly where new types of rules are included. |
+ | |exploit|Known generic exploits. | ||
|exploit-kit|Exploit kit activity.| | |exploit-kit|Exploit kit activity.| | ||
|:::|This does not include **post-compromise** rules (as those would be in indicator-compromise).| | |:::|This does not include **post-compromise** rules (as those would be in indicator-compromise).| | ||
Line 43: | Line 47: | ||
|file-pdf|PDF file vulnerabilities.| | |file-pdf|PDF file vulnerabilities.| | ||
|file-other|File vulnerabilities, | |file-other|File vulnerabilities, | ||
+ | |finger|Finger service that runs by default on many Unix-based operating systems.| |Y| | ||
+ | |ftp|FTP service.| |Y| | ||
+ | |icmp|Pings specific to particular attack tools.| |Y| | ||
+ | |icmp-info|For troubleshooting a specific ICMP problem on the network, but in general it just generates noise and should remain disabled.| |Y| | ||
+ | |imap|IMAP email service.| |Y| | ||
|indicator-compromise|The detection of a positively compromised system; false positives may occur.| | |indicator-compromise|The detection of a positively compromised system; false positives may occur.| | ||
|indicator-obfuscation|The detection of obfuscated content. Like encoded JavaScript rules.| | |indicator-obfuscation|The detection of obfuscated content. Like encoded JavaScript rules.| | ||
|indicator-shellcode|Detection of Shellcode. This replaces the old " | |indicator-shellcode|Detection of Shellcode. This replaces the old " | ||
|indicator-scan|Detection of network scanning. This replaces the old " | |indicator-scan|Detection of network scanning. This replaces the old " | ||
- | |local|Local rules.| | + | |info|For troubleshooting.| |Y| |
+ | |local|Local rules you create.| | ||
|malware-backdoor|Detection of traffic destined to known listening backdoor command channels.| | |malware-backdoor|Detection of traffic destined to known listening backdoor command channels.| | ||
|malware-cnc|Identified botnet traffic.| | |malware-cnc|Identified botnet traffic.| | ||
|malware-other|Malware related, but do not fit into one of the other **malware** categories.| | |malware-other|Malware related, but do not fit into one of the other **malware** categories.| | ||
|malware-tools|Malicious in nature.| | |malware-tools|Malicious in nature.| | ||
- | |misc|Web Miscellanious.| | + | |misc|Miscellanious |
- | |multimedia|Streaming media may be a violation of corporate policies.| | + | |multimedia|Streaming media.|Y|Y| |
- | |mysql|Unusual and potentially malicious | + | |mysql|Unusual and potentially malicious |
- | |netbios|Netbios.| | + | |netbios|Administrative share access alerts on SMB and NetBIOS access.| |
- | |nntp|NNTP.| | + | |nntp|NNTP |
- | |oracle|Oracle.| | + | |oracle|Oracle |
|os-linux|Vulnerabilities in Linux based OSes. Not for browsers or any other software on it, but simply against the OS itself.| | |os-linux|Vulnerabilities in Linux based OSes. Not for browsers or any other software on it, but simply against the OS itself.| | ||
|os-solaris|Vulnerabilities in Solaris based OSes. Not for any browsers or any other software on top of the OS.| | |os-solaris|Vulnerabilities in Solaris based OSes. Not for any browsers or any other software on top of the OS.| | ||
Line 63: | Line 73: | ||
|os-mobile|Vulnerabilites in Mobile based OSes. Not for any browsers or any other software on the top of the OS.| | |os-mobile|Vulnerabilites in Mobile based OSes. Not for any browsers or any other software on the top of the OS.| | ||
|os-other|Vulnerabilities in an OS that is not listed above.| | |os-other|Vulnerabilities in an OS that is not listed above.| | ||
- | |other-ids|The use of other IDSs.| | + | |other-ids|The use of other IDSs.| |Y| |
- | |p2p|The use of P2P protocols, which are usually against corporate policy.| | + | |p2p|The use of P2P (peer to peer software) |
- | |phishing-spam|Phishing spam.| | + | |phishing-spam|Phishing spam.| |Y| |
- | |policy|Policy rules, | + | |policy|Policy rules, |
- | |policy-multimedia|Potential violations of policy for multimedia, such as the use of iTunes on the network.| | + | |policy-multimedia|Potential violations of policy for multimedia, such as the use of iTunes on the network.|Y| |
- | |:::|This is not for vulnerabilities found within multimedia files, as that would be in file-multimedia.| | + | |:::|This is not for vulnerabilities found within multimedia files, as that would be in file-multimedia.|:::| |
- | |policy-other|May violate the end-users corporate policy but do not fall into any of the other policy categories first.| | + | |policy-other|May violate the end-users corporate policy but do not fall into any of the other policy categories first.|Y| |
- | |policy-social|Potential violations of policy on corporate networks for the use of social media. (p2p, chat, etc).| | + | |policy-social|Potential violations of policy on corporate networks for the use of social media. (p2p, chat, etc).|Y| |
- | |policy-spam|Potential spam on the network.| | + | |policy-spam|Potential spam on the network.|Y| |
- | |pop2|POP2 | + | |pop2|POP2 |
- | |pop3|POP3 | + | |pop3|POP3 |
+ | |porn|Porn.|Y| | ||
|protocol-dns|The presence of DNS protocol or vulnerabilities on the network.| | |protocol-dns|The presence of DNS protocol or vulnerabilities on the network.| | ||
|protocol-finger|The presence of the finger protocol or vulnerabilities on the network.| | |protocol-finger|The presence of the finger protocol or vulnerabilities on the network.| | ||
Line 93: | Line 104: | ||
|pua-p2p|Potentially Unwanted Applications (pau) that deal with p2p.| | |pua-p2p|Potentially Unwanted Applications (pau) that deal with p2p.| | ||
|pua-toolbars|Potentially Unwanted Applications (pau) that deal with toolbars installed on the client system. (Google Toolbar, Yahoo Toolbar, Hotbar, etc)| | |pua-toolbars|Potentially Unwanted Applications (pau) that deal with toolbars installed on the client system. (Google Toolbar, Yahoo Toolbar, Hotbar, etc)| | ||
- | |rpc|RPC (Remote Procedure Call).| | + | |rpc|RPC (Remote Procedure Call).| |Y| |
- | |rservices|MS SQL Server R Services.| | + | |rservices|The use of rservices commands to control remote systems, including rlogin, rsh, and rexec.| |Y| |
- | |scada|Scada.| | + | |scada|Scada.| |Y| |
- | |scan|Network scanners, including port scanning, IP mapping, and various application scanners.| | + | |scan|Network scanners, including port scanning, IP mapping, and various application scanners.| |Y| |
|server-apache|Apache Web Server.| | |server-apache|Apache Web Server.| | ||
|server-iis|Microsoft IIS Web server.| | |server-iis|Microsoft IIS Web server.| | ||
Line 107: | Line 118: | ||
|server-samba|Samba Servers.| | |server-samba|Samba Servers.| | ||
|server-webapp|Web based applications on servers.| | |server-webapp|Web based applications on servers.| | ||
- | |shellcode|Attempt is made to execute | + | |shellcode|Detects |
- | |smtp|SMTP.| | + | |::: |
- | |snmp|SNMP.| | + | |smtp|SMTP |
- | |specific-threats| | | + | |snmp|SNMP |
- | |spyware-put|Spyware.| | + | |specific-threats|Specific-threats.| |Y| |
+ | |spyware-put|Spyware.| |Y| | ||
|sql|SQL injection or other vulnerabilities against SQL like servers.| | |sql|SQL injection or other vulnerabilities against SQL like servers.| | ||
- | |telnet|Various telnet | + | |telnet|Telnet |
- | |tftp|DEPRECIATED RULES. | + | |tftp|TFTP.| |Y| |
- | |virus|Virus.| | + | |virus|Virus.| |Y| |
- | |voip|VOIP.| | + | |voip|VOIP.| |Y| |
- | |web-activex|ActiveX.| | + | |web-activex|ActiveX.| |Y| |
- | |web-attacks|Web form variable vulnerabilities.| | + | |web-attacks|Web servers and Web form variable vulnerabilities.| |Y| |
- | |web-cgi|CGI (Common Gateway Interface) which web servers use to execute external programs.| | + | |web-cgi|CGI (Common Gateway Interface) which web servers use to execute external programs.| |Y| |
- | |web-client|Bad things coming from users, and attacks against web users.| | + | |web-client|Bad things coming from users, and attacks against web users.| |Y| |
- | |web-coldfusion|Coldfusion web application services.| | + | |web-coldfusion|Coldfusion web application services.| |Y| |
- | |web-frontpage|Frontpage web authoring services.| | + | |web-frontpage|Frontpage web authoring services.| |Y| |
- | |web-iis|Microsoft Internet Information Server (IIS) web servers.| | + | |web-iis|Microsoft Internet Information Server (IIS) web servers.| |Y| |
- | |web-misc|Generic web attacks.| | + | |web-misc|Generic web attacks.| |Y| |
- | |web-php|Attacks against web servers running PHP applications | + | |web-php|Attacks against web servers running PHP applications.| |Y| |
- | |x11|X11 usage or other vulnerabilities against X11 like servers.| | + | |x11|X11 usage or other vulnerabilities against X11 like servers.| |Y| |
ids/rule_categories/snort_rule_set_categories.1627125495.txt.gz · Last modified: 2021/07/24 11:18 by peter