Skip to content
Discussion options

You must be logged in to vote

Depending on how/where you want to put the value you could do something like below.

This yields a rule that looks like this:

[root@so-managersearch logstash]# grep 2026889 /opt/so/rules/nids/suri/all.rules
alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET INFO Suspicious Domain (*.icu) in TLS SNI"; flow:established,to_server; threshold: type limit, count 1, track by_src, seconds 120; tls.sni; content:".icu"; content: !"cc.cloudad.icu"; endswith; fast_pattern; nocase; classtype:bad-unknown; sid:2026889; rev:4; metadata:attack_target Client_Endpoint, created_at 2019_02_06, deployment Perimeter, confidence High, signature_severity Informational, updated_at 2022_11_21;)

Replies: 1 comment 3 replies

Comment options

You must be logged in to vote
3 replies
@Zer0-cyber-web
Comment options

@Zer0-cyber-web
Comment options

@Zer0-cyber-web
Comment options

Answer selected by Zer0-cyber-web
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
2.4
Labels
None yet
2 participants