Snort Analyser
First select your Wireshark trace:
Trace name: /log/with_jpg.zip
Snort Output
Click here for the Pcap file. The Snort output is:
alert.ids: [**] [1:10004:0] JPEG [**] [Priority: 0] 11/19-18:49:00.484289 172.16.121.163:1440 -> 212.227.84.95:80 TCP TTL:128 TOS:0x0 ID:12793 IpLen:20 DgmLen:6251 DF ***AP*** Seq: 0x7472C190 Ack: 0x1D7B1A45 Win: 0xFAF0 TcpLen: 20 [**] [1:10000:0] GIF [**] [Priority: 0] 11/19-18:49:01.217721 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61411 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7BEC1D Ack: 0x7472D9D3 Win: 0xFAF0 TcpLen: 20 [**] [1:10001:0] PDF [**] [Priority: 0] 11/19-18:49:01.217721 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61411 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7BEC1D Ack: 0x7472D9D3 Win: 0xFAF0 TcpLen: 20 [**] [1:10007:0] Flash SWF [**] [Priority: 0] 11/19-18:49:01.217723 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61412 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7BF1D1 Ack: 0x7472D9D3 Win: 0xFAF0 TcpLen: 20 [**] [1:10005:0] MP3 [**] [Priority: 0] 11/19-18:49:01.217723 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61412 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7BF1D1 Ack: 0x7472D9D3 Win: 0xFAF0 TcpLen: 20 [**] [1:10004:0] JPEG [**] [Priority: 0] 11/19-18:49:30.677836 172.16.121.163:1440 -> 212.227.84.95:80 TCP TTL:128 TOS:0x0 ID:12949 IpLen:20 DgmLen:16376 DF ***AP*** Seq: 0x7472DC59 Ack: 0x1D7BF9D2 Win: 0xFAF0 TcpLen: 20 [**] [1:10000:0] GIF [**] [Priority: 0] 11/19-18:49:31.937985 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61654 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7D046A Ack: 0x74732E7D Win: 0xFAF0 TcpLen: 20 [**] [1:10001:0] PDF [**] [Priority: 0] 11/19-18:49:31.937985 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61654 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7D046A Ack: 0x74732E7D Win: 0xFAF0 TcpLen: 20 [**] [1:10007:0] Flash SWF [**] [Priority: 0] 11/19-18:49:31.937986 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61655 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7D0A1E Ack: 0x74732E7D Win: 0xFAF0 TcpLen: 20 [**] [1:10005:0] MP3 [**] [Priority: 0] 11/19-18:49:31.937986 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:61655 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7D0A1E Ack: 0x74732E7D Win: 0xFAF0 TcpLen: 20 [**] [1:10004:0] JPEG [**] [Priority: 0] 11/19-18:49:54.465229 172.16.121.163:1440 -> 212.227.84.95:80 TCP TTL:128 TOS:0x0 ID:13146 IpLen:20 DgmLen:14201 DF ***AP*** Seq: 0x74733103 Ack: 0x1D7D120E Win: 0xFAF0 TcpLen: 20 [**] [1:10000:0] GIF [**] [Priority: 0] 11/19-18:49:55.181171 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:62066 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7E1D1E Ack: 0x74736854 Win: 0xFAF0 TcpLen: 20 [**] [1:10001:0] PDF [**] [Priority: 0] 11/19-18:49:55.181171 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:62066 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7E1D1E Ack: 0x74736854 Win: 0xFAF0 TcpLen: 20 [**] [1:10007:0] Flash SWF [**] [Priority: 0] 11/19-18:49:55.181172 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:62067 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7E22D2 Ack: 0x74736854 Win: 0xFAF0 TcpLen: 20 [**] [1:10005:0] MP3 [**] [Priority: 0] 11/19-18:49:55.181172 212.227.84.95:80 -> 172.16.121.163:1440 TCP TTL:128 TOS:0x0 ID:62067 IpLen:20 DgmLen:1500 ***A**** Seq: 0x1D7E22D2 Ack: 0x74736854 Win: 0xFAF0 TcpLen: 20 |
Rules file
# Signature Detection alert tcp any any -> any any (content:"GIF89a"; msg:"GIF";sid:10000) alert tcp any any -> any any (content:"%PDF"; msg:"PDF";sid:10001) alert tcp any any -> any any (content:"|89 50 4E 47|"; msg:"PNG";sid:10002) alert tcp any any -> any any (content:"|50 4B 03 04|"; msg:"ZIP";sid:10003) alert tcp any any -> any any (content:"|FF D8|"; msg:"JPEG";sid:10004) alert tcp any any -> any any (content:"|49 44 33|"; msg:"MP3";sid:10005) alert tcp any any -> any any (content:"|52 49 46 46|"; msg:"AVI";sid:10006) alert tcp any any -> any any (content:"|46 57 53|"; msg:"Flash SWF";sid:10007) alert tcp any any -> any any (content:"|46 4C 56|"; msg:"Flash Video";sid:10008) alert tcp any any -> any any (content:"|1F 8B 08|"; msg:"GZip";sid:10009) alert tcp any any -> any any (content:"|52 61 72 21 1A 07 00|"; msg:"RAR";sid:10010) alert tcp any any -> any any (content:"|D0 CF 11 E0 A1 B1 1A E1|"; msg:"Office 2010";sid:10011)
Examples
You can use Snort as a stand-alone analyser using the "-r" option. The following are the traces that can be used in Snort:
- Trace with Hydra FTP crack/Bad Login: here Test.
- Trace with Hydra Telnet crack: here Test.
- Trace with Port Scan: here Test.
- Trace with SYN Flood (DoS): here Test.
- Trace with FIN Flood (DoS): here Test.
- Trace with PDF file: here Test.
- Trace with GIF file: here Test.
- Trace with PNG file: here Test.
- Trace with email attachments (MIME): here Test.
- Trace with email addresses: here Test.
- Trace with credit card details: here Test.
- Trace with DNS: here Test.
- Trace with Ping sweep: here Test.
- Trace with SNMP: here Test.
- Trace with ARP Spoof: here Test.
- Trace with Heartbleed: here Test.
- Teardrop DoS: here Test.
- Bittorrent: here Test.