Suricata_Issues #11175
Suricata_Issues
#11175
Replies: 1 comment 5 replies
-
Do you have 2 NICs, one for management (with IP address) and a separate dedicated NIC for sniffing (without IP address)? Are you sniffing traffic from a tap or span port? |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
hello i need helps i am try to personalize suricata rules here is my rule configuration in /opt/so/saltstack/local/salt/idstools/local.rules
:
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN Nmap Scripting Engine User-Agent Detected (Nmap Scripting Engine)"; flow:to_server,established; http.user_agent; content:"Mozilla/5.0 (compatible|3b| Nmap Scripting Engine"; nocase; depth:46; reference:url,doc.emergingthreats.net/2009358; classtype:web-application-attack; sid:2009358; rev:6; metadata:created_at 2010_07_30, updated_at 2020_04_22;)
alert http $HOME_NET any -> any any (msg:"ET SCAN Possible Nmap User-Agent Observed"; flow:to_server,established; http.user_agent; content:"|20|Nmap"; fast_pattern; classtype:web-application-attack; sid:2024364; rev:4; metadata:affected_product Any, attack_target Client_and_Server, created_at 2017_06_08, deployment Perimeter, former_category SCAN, performance_impact Low, signature_severity Informational, updated_at 2020_08_06;)
and my suricata.yml is :
vars:
address-groups:
HOME_NET: '[192.168.150.0/24]'
EXTERNAL_NET: any
HTTP_SERVERS: $HOME_NET
my snifging ip fix is 192.168.150.61 So now even i try nmap i dont see alerte in all network . for example i can see juste nmap alerte beetwen my sneff ip and a nother host(linux) but not between the other adresse on windows i hav not alerte .
Beta Was this translation helpful? Give feedback.
All reactions