03.04.2013 Views

The menace came from below - Hack.lu

The menace came from below - Hack.lu

The menace came from below - Hack.lu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Detecting overlapping data<br />

Rule<br />

Attack is pretending to come <strong>from</strong> server.<br />

Full example rule:<br />

a l e r t tcp any 21 −> any any (msg : " Overlap data " ; \<br />

flow : t o _ c l i e n t ; dsize : >0; \<br />

stream −event : reassembly_overlap_different_data ; \<br />

classtype : protocol −command−decode ; s i d : 1 ; rev : 1 ; )<br />

Éric Leblond, Victor Julien (OISF) <strong>The</strong> <strong>menace</strong> <strong>came</strong> <strong>from</strong> <strong>below</strong> <strong>Hack</strong>.<strong>lu</strong> 2012 39 / 66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!