• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Find snort rules name from snort alert

Scheduled Pinned Locked Moved pfSense Packages
6 Posts 3 Posters 5.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F
    fosiul
    last edited by Aug 2, 2010, 2:50 PM

    HI
    I am having difficulties to find snort rules from the alert
    Example :

    [] [1:2406235:192] ET RBN Known Russian Business Network IP UDP (118) []
    [Classification: Misc Attack] [Priority: 2]
    08/02-15:07:09.606751 218.75.149.210:53 -> 192.168.88.1:45560
    UDP TTL:44 TOS:0x0 ID:25003 IpLen:20 DgmLen:126
    Len: 98
    [Xref => http://doc.emergingthreats.net/bin/view/Main/RussianBusinessNetwork]

    So By looking at the alert , sid : 2406235

    But which snort rules is related to this alert ??
    Some of them are easy to know example : imp rules, but for some rules i cant understand which rules to check

    so how will i know which alert is related to which snort rules

    thanks for advise .

    1 Reply Last reply Reply Quote 0
    • C
      Cry Havok
      last edited by Aug 2, 2010, 8:57 PM

      You've already identified that - rule number 2406235, revision 192 (you can tell it's a rule because the generator ID is 1).  The reference URL tells you where to get more information.

      You can find the rule itself by looking for the RULE_PATH entries (from memory) in your snort configuration file and then seeing which contains the rule number in question.  It would make your life easier if you ensured that your Snort interface (SGUIL or whatever you're using) has the same ruleset available to it.  The actual file names themselves aren't relevant.

      1 Reply Last reply Reply Quote 0
      • F
        fosiul
        last edited by Aug 3, 2010, 7:55 AM

        Hi Thanks for your reply.

        But still i am confused about your this comments :
        "You can find the rule itself by looking for the RULE_PATH entries (from memory) in your snort configuration file and then seeing which contains the rule number in question. "

        I have installed by pfsense.
        and if i go to rules directory :/usr/local/etc/snort/rules

        I see the same rules which i am seeing from GUI interface of snort. but still i cant relate which rules shall i check for snor,  sid : 2406235

        Bellow is the rule path entry from snort.conf
        var RULE_PATH ../rules
        var SO_RULE_PATH ../so_rules
        var PREPROC_RULE_PATH ../preproc_rules

        Again if i go to rules directory i just see like bellow :

        pwd

        /usr/local/etc/snort/rules

        ls

        Makefile.am                            snort_icmp.rules
        VRT-License.txt                        snort_icmp.so.rules
        cgi-bin.list                            snort_imap.rules
        emerging-attack_response.rules          snort_imap.so.rules
        emerging-botcc.excluded                snort_info.rules
        emerging-compromised.rules              snort_local.rules
        emerging-current_events.rules          snort_misc.rules
        emerging-dos.rules                      snort_misc.so.rules
        emerging-drop.rules                    snort_multimedia.rules
        emerging-dshield.rules                  snort_multimedia.so.rules
        emerging-exploit.rules                  snort_mysql.rules
        emerging-game.rules                    snort_netbios.rules
        emerging-inappropriate.rules            snort_netbios.so.rules
        emerging-malware.rules                  snort_nntp.rules
        emerging-p2p.rules                      snort_nntp.so.rules
        emerging-policy.rules                  snort_oracle.rules
        emerging-rbn.rules                      snort_other-ids.rules
        emerging-readme.txt                    snort_p2p.rules
        emerging-scan.rules                    snort_p2p.so.rules
        emerging-sid-msg.map                    snort_policy.rules
        emerging-sid-msg.map.txt                snort_pop2.rules
        emerging-tor.rules                      snort_pop3.rules
        emerging-user_agents.rules              snort_rpc.rules
        emerging-virus.rules                    snort_rservices.rules
        emerging-voip.rules                    snort_scada.rules
        emerging-web.rules                      snort_scan.rules
        emerging-web_client.rules              snort_shellcode.rules
        emerging-web_server.rules              snort_smtp.rules
        emerging-web_specific_apps.rules        snort_smtp.so.rules
        emerging-web_sql_injection.rules        snort_snmp.rules
        emerging.conf                          snort_specific-threats.rules
        emerging.rules                          snort_spyware-put.rules
        open-test.conf                          snort_sql.rules
        pfsense-voip.rules                      snort_sql.so.rules
        snort_attack-responses.rules            snort_telnet.rules
        snort_backdoor.rules                    snort_tftp.rules
        snort_bad-traffic.rules                snort_virus.rules
        snort_bad-traffic.so.rules              snort_voip.rules
        snort_chat.rules                        snort_web-activex.rules
        snort_chat.so.rules                    snort_web-activex.so.rules
        snort_content-replace.rules            snort_web-attacks.rules
        snort_ddos.rules                        snort_web-cgi.rules
        snort_deleted.rules                    snort_web-client.rules
        snort_dns.rules                        snort_web-client.so.rules
        snort_dos.rules                        snort_web-coldfusion.rules
        snort_dos.so.rules                      snort_web-frontpage.rules
        snort_experimental.rules                snort_web-iis.rules
        snort_exploit.rules                    snort_web-iis.so.rules
        snort_exploit.so.rules                  snort_web-misc.rules
        snort_finger.rules                      snort_web-misc.so.rules
        snort_ftp.rules                        snort_web-php.rules
        snort_icmp-info.rules                  snort_x11.rules

        so i am in doubt , how will you know which file to edit for the rule of  sid : 2406235

        Thanks for your patience

        1 Reply Last reply Reply Quote 0
        • C
          Cry Havok
          last edited by Aug 3, 2010, 11:16 AM

          egrep "sid:[ ]2406235;" /usr/local/etc/snort/rules/.rules

          Replace 2406235 with the rule number you're interested in.

          1 Reply Last reply Reply Quote 0
          • F
            fosiul
            last edited by Aug 3, 2010, 1:33 PM

            HI
            Thanks
            thats  a easy way to find!!!

            did not realize you can find that by using egrep command

            Thanks again

            1 Reply Last reply Reply Quote 0
            • G
              g4m3c4ck
              last edited by Aug 5, 2010, 3:09 PM

              [] [1:2406235:192] ET RBN Known Russian Business Network IP UDP (118) []

              Also most of the categories relate to the alert. With a little guesswork most of the time you can go right to it in the gui.

              emerging-rbn.rules

              ET= Emerging Threats

              1 Reply Last reply Reply Quote 0
              1 out of 6
              • First post
                1/6
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                This community forum collects and processes your personal information.
                consent.not_received