Dernière activité 1765242514

ridzimeko a révisé ce gist 1765242514. Aller à la révision

1 file changed, 4 insertions

xss.rules(fichier créé)

@@ -0,0 +1,4 @@
1 + alert tcp any any -> any any ( msg:"XSS Attempt Detected — injected closing tag"; flow:to_server,established; content:"\"><script"; nocase; http_client_body; classtype:web-application-attack; severity:2; sid:500003; rev:1; )
2 + alert tcp any any -> any any ( msg:"XSS Attempt Detected — event handler onerror/onload"; flow:to_server,established; content:"onerror="; nocase; http_client_body; classtype:web-application-attack; severity:2; sid:500002; rev:1; )
3 + alert tcp any any -> any any ( msg:"XSS Attempt Detected — script tag"; flow:to_server,established; content:"<script"; nocase; http_client_body; classtype:web-application-attack; severity:2; sid:500001; rev:1; )
4 + alert tcp any any -> any any (msg:"[WARNING] Percobaan XSS Terdeteksi: Injeksi <script>"; priority:2; content:"%3Cscript%3E"; nocase; classtype:web-application-attack; sid:1000012; rev:7;)

ridzimeko a révisé ce gist 1765242085. Aller à la révision

1 file changed, 32 insertions

gistfile1.txt(fichier créé)

@@ -0,0 +1,32 @@
1 + #alert tcp any any -> $HOME_NET any ( msg:"POTENSI DDoS SYN Flood"; flags:S; flow:stateless; threshold:type both, track by_dst, count 1000, seconds 10; classtype:attempted-dos; priority:2; sid:2000012; rev:1; )
2 + alert arp any any -> any any ( msg:"POTENSI ARP Spoofing - ARP Reply mencurigakan"; arp_opcode:2; # opcode 2 = ARP reply detection_filter:track by_src, count 5, seconds 10; classtype:network-scan; priority:2; sid:2000013; rev:1; )
3 + alert tcp !$HOME_NET any -> $HOME_NET any (flags: A; msg:"Possible ACK DoS"; flow: stateless; threshold: type both, track by_dst, count 1000, seconds 3; classtype:attempted-dos; sid:10001;rev:1;)
4 + alert tcp !$HOME_NET any -> $HOME_NET any (flags: R; msg:"Possible RST DoS"; flow: stateless; threshold: type both, track by_dst, count 1000, seconds 3; classtype:attempted-dos; sid:10003;rev:1;)
5 + alert tcp !$HOME_NET any -> $HOME_NET any (flags: F; msg:"Possible FIN DoS"; flow: stateless; threshold: type both, track by_dst, count 1000, seconds 3; classtype:attempted-dos; sid:10004;rev:1;)
6 + alert udp !$HOME_NET any -> $HOME_NET any (msg:"Possible UDP DoS"; flow: stateless; threshold: type both, track by_dst, count 1000, seconds 3; classtype:attempted-dos; sid:10005;rev:1;)
7 +
8 + # SYN SCAN -sS (speeds T1-T5)
9 +
10 + alert tcp any any -> any [21,22,23,25,53,80,88,110,135,137,138,139,143,161,389,443,445,465,514,587,636,853,993,995,1194,1433,1720,3306,3389,8080,8443,11211,27017,51820] (msg:"POSSBL PORT SCAN (NMAP -sS)"; flow:to_server,stateless; flags:S; window:1024; tcp.mss:1460; threshold:type threshold, track by_src, count 20, seconds 70; classtype:attempted-recon; sid:3400001; priority:2; rev:1;)
11 + alert tcp any any -> any ![21,22,23,25,53,80,88,110,135,137,138,139,143,161,389,443,445,465,514,587,636,853,993,995,1194,1433,1720,3306,3389,8080,8443,11211,27017,51820] (msg:"POSSBL PORT SCAN (NMAP -sS)"; flow:to_server,stateless; flags:S; window:1024; tcp.mss:1460; threshold:type threshold, track by_src, count 7, seconds 135; classtype:attempted-recon; sid:3400002; priority:2; rev:2;)
12 +
13 + # SYN-ACK 3-WAY SCAN -sT (speeds T2-T5)
14 +
15 + alert tcp any ![22,25,53,80,88,143,443,445,465,587,853,993,1194,8080,51820] -> any ![22,25,53,80,88,143,443,445,465,587,853,993,1194,8080,51820] (msg:"POSSBL PORT SCAN (NMAP -sT)"; flow:to_server; window:32120; flags:S; threshold:type threshold, track by_src, count 20, seconds 70; classtype:attempted-recon; sid:3400003; rev:3;)
16 +
17 + # ACK SCAN -sA (speeds T2-T5)
18 +
19 + alert tcp any ![22,25,53,80,88,143,443,445,465,587,853,993,1194,8080,51820] -> any ![22,25,53,80,88,143,443,445,465,587,853,993,1194,8080,51820] (msg:"POSSBL PORT SCAN (NMAP -sA)"; flags:A; flow:stateless; window:1024; threshold:type threshold, track by_dst, count 20, seconds 70; classtype:attempted-recon; sid:3400004; priority:2; rev:5;)
20 +
21 + # CHRISTMAS TREE SCAN -sX (speeds T1-T5)
22 +
23 + alert tcp any any -> any any (msg:"POSSBL PORT SCAN (NMAP -sX)"; flags:FPU; flow:to_server,stateless; threshold:type threshold, track by_src, count 3, seconds 120; classtype:attempted-recon; sid:3400005; rev:2;)
24 +
25 + # FRAGMENTED SCAN -f (speeds T1-T5)
26 +
27 + alert ip any any -> any any (msg:"POSSBL SCAN FRAG (NMAP -f)"; fragbits:M+D; threshold:type limit, track by_src, count 3, seconds 1210; classtype:attempted-recon; sid:3400006; priority:2; rev:6;)
28 +
29 + # UDP SCAN -sU (speeds T1-T5)
30 +
31 + alert udp any any -> any [53,67,68,69,123,161,162,389,520,1026,1027,1028,1029,1194,1434,1900,11211,12345,27017,51820] (msg:"POSSBL PORT SCAN (NMAP -sU)"; flow:to_server,stateless; classtype:attempted-recon; sid:3400007; priority:2; rev:6; threshold:type threshold, track by_src, count 20, seconds 70; dsize:0;)
32 + alert udp any any -> any ![53,67,68,69,123,161,162,389,520,1026,1027,1028,1029,1194,1434,1900,11211,12345,27017,51820] (msg:"POSSBL PORT SCAN (NMAP -sU)"; flow:to_server,stateless; classtype:attempted-recon; sid:3400008; priority:2; rev:6; threshold:type threshold, track by_src, count 7, seconds 135; dsize:0;)
Plus récent Plus ancien