Home
Help
Search
Login
Register
OPNsense Forum
»
English Forums
»
Intrusion Detection and Prevention
»
I Have Noob Questions About Some Current Open/ET 6 Rule Categories
« previous
next »
Print
Pages: [
1
]
Author
Topic: I Have Noob Questions About Some Current Open/ET 6 Rule Categories (Read 527 times)
Stinky-Packets
Newbie
Posts: 3
Karma: 0
I Have Noob Questions About Some Current Open/ET 6 Rule Categories
«
on:
May 08, 2024, 08:44:43 pm »
This means what exactly?
- I'm new.
- The following clarifications are confusing to me
- I'm at the "Pick the Rule-Sets you want" part of my first setup
Attack Response–
This category is for signatures to identify responses indicative of intrusion, results of a successful attack, and scripts (including common obfuscation methods) commonly used in the delivery of malware or other malicious payloads.
1.“ identify responses indicative of intrusion”
What sort of “responses” would that be? Would I alert on, or drop the "responses”?
2.“identify results of a successful attack”
So alert or drop the results? Both seem like strange options. If it knows an attack was successful, why didn't it block it first, so the attack failed instead?
3. “identify scripts (including common obfuscation methods) commonly used in the delivery of malware or other malicious payloads”
- Does this drop scripts?
- Which scripts? “commonly used” is rather open and would match almost any script, right? Malware and “other” malicious payloads are usually installed/delivered in the same fashion of Legitimateware and “not” malicious payloads.
- How do these rules differentiate between the two?
Botcc Portgrouped–
This category is for signatures like those in the Botcc category but grouped by destination port. Rules grouped by port can offer higher fidelity than those not grouped by port.
- So this is a list of random ports?
- Why not add the ports to Botcc rulesets by default if it offers “higher fidelity”?
Current Events–
This category is for signatures with rules developed in response to active and short-lived campaigns and high-profile items that are expected to be temporary. One example is fraud campaigns related to disasters. The rules in this category are ones that are not intended to be kept in in the ruleset for long, or that need to be further tested before they are considered for inclusion. Most often these will be simple sigs for the Storm binary URL of the day, sigs to catch CLSID’s of newly found vulnerable apps where we don’t have any detail on the exploit, etc.
“The rules in this category are ones that are not intended to be kept in in the ruleset for long”
- So do they update themselves and remove the no longer needed rules?
- Define “for long”, how long exactly is that?
- Am I supposed to delete this ruleset and re-install it every few days?
“rules developed in response to active and short-lived campaigns and high-profile items that are expected to be temporary.”
- Isn't the ET/Open list 30days old?
“need to be further tested before they are considered for inclusion”
- Shouldn't this ruleset be in the “testing” list then?
Deleted–
This category is for signatures removed from the rule set. Note that typically rules are retained in a deactivated state within their respective rule files (starting with a #) but some rules that are duplicates, moved from Pro to Open (and thus need a new SID for the Open rule) or are too problematic to retain are moved to the Deleted category.
- Then delete them? Why have a list of no longer included signatures at all?
Exploit-Kit–
This category is for signatures to detect activity related to Exploit Kits, their infrastructure (including TDS domains), and delivery.
- “related to” how?
- Which “activity”?
- Do I just alert on this “activity”?
Games–
T
his category is for signatures that identify of gaming traffic and attacks against those games. These rules cover games such as World of Warcraft, Starcraft, and other popular online games. While these games and their traffic are not malicious, they are often unwanted and prohibited by policy on corporate networks.
- I like games and I don't want them attacked. So do I drop the Games rules packets?
- How do the rules differentiate between “gaming traffic” vs “attacks against those games”? I don't want to hamper “gaming traffic” or be attacked!
Hunting–
This category is for signatures that provide indicators that when matched with other signatures can be very useful for threat hunting in an environment. These rules can provide false positives on legitimate traffic and inhibit performance. They are only recommended for use when actively researching potential threats in the environment.
"They are only recommended for use when actively researching potential threats in the environment."
- Is that not the whole idea of IDS/IPS, to be constantly “researching”/hunting for potential threats?
“These rules can provide false positives on legitimate traffic and inhibit performance.”
- That doesn't seem very useful…
"This category is for signatures that provide indicators that when matched with other signatures can be very useful for threat hunting in an environment. "
- How would the signatures, that when matched with other signatures, be used?
- This comma --→ , ←-- is begging to be used. That comma has friends ,,,,,,, ←--
ICMP_info–[/b
]This category is for signatures related to ICMP protocol specific events, typically associated with normal operations for logging purposes.
- Why is this here then?
Info–
This category is for signatures to help provide audit level events that are useful for correlation and identifying interesting activity which may not be inherently malicious but is often observed in malware and other threats, for example downloading an Executable over HTTP by IP address rather than domain name.
- How would my IPS use this "Info" as a ruleset? I need info on “Info”.
Misc.–
This category is for signatures not covered in other categories.
- …
- Seriously!?
- What am I supposed to do with that? “Oh no, I'm being attacked by ”Misc"!" “Quick do the “Thing”!" "Alert the “Noun”!”
Policy–
This category is for signatures that may indicate violations to an organization’s policy. This can include protocols prone to abuse, and other application-level transactions which may be of interest.
- My organization is a home. Does my organization care about the abused protocols?
- How interesting are the “application-level transactions”?
- What are the “application-level transactions”?
- What would my organization do with these violations?
- Can I drop them, or since they are “application-level transactions”, have they already happened?
SCADA_
special–This category is for signatures written for Snort Digital Bond based SCADA preprocessor.
- Super! What do I do with them?
- What are they?
- If I had a “Snort Digital Bond based SCADA preprocessor” would I know it?
- Are Snort Digital Bond based SCADA preprocessors on sale on Black Friday?
- Do I plug my new Snort Digital Bond based SCADA preprocessor into USB?
Thanks for any help you can offer!
«
Last Edit: May 08, 2024, 09:15:35 pm by Stinky-Packets
»
Logged
Stinky-Packets
Newbie
Posts: 3
Karma: 0
Re: I Have Noob Questions About Some Current Open/ET 6 Rule Categories
«
Reply #1 on:
May 08, 2024, 08:47:24 pm »
... well that got formatted! :'(
Logged
Print
Pages: [
1
]
« previous
next »
OPNsense Forum
»
English Forums
»
Intrusion Detection and Prevention
»
I Have Noob Questions About Some Current Open/ET 6 Rule Categories