<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help on Custom  signature base on the return traffic in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125344#M143</link>
    <description>&lt;P&gt;any advise?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2016 18:51:19 GMT</pubDate>
    <dc:creator>kowu</dc:creator>
    <dc:date>2016-11-09T18:51:19Z</dc:date>
    <item>
      <title>help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125185#M139</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Dear Bros&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anyone has the experience of create custom signature base on the return traffic? attached please find the PCAP file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This is JBoss attack while custom want us to alert base on the server return traffic content pattern which means attack most likely successful&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attacker:10.63.212.201 server:10.10.228.94&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 08:58:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125185#M139</guid>
      <dc:creator>kowu</dc:creator>
      <dc:date>2016-11-09T08:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125209#M140</link>
      <description>&lt;P&gt;Hi Kowu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Welcome to our community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When looking at this pcap - it seems to be a capture of communication to the localhost: Host: 127.0.0.1:9090; therefore I assume this was POC code. Firewall cannot help much in intercepting traffic from an endpoint to itself &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not familiar with this attack, can you share more details on the attack technique itself? What is the attack doing, what are bits related to the attack... is the CVE associated with this technique or some other detail, is it described somewhere? Or, at least, what is the string you believe implies that server was attacked? I see pcap looks complete but I am not sure what is "good" and what is "bad" part of the response. It is better to find "bad" code to create signature for it, to avoid possible false positives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please share a bit more detail so we can help you better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Luciano&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 11:21:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125209#M140</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2016-11-09T11:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125260#M141</link>
      <description>&lt;P&gt;Thanks luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it is related with Jboss CVE vul(Red Hat JBoss Commons Collections Library Remote Code Execution Vulnerability) ID 38507,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer want a custom signature to combine this CVE with the related reply session from the vicitm which means the attack is most likely successful&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;let's if the attack session hit the CVE, while the response traffic in the session from vicitm contain "http 1.1 200 ok" means the attack session is established or successful&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this signature is to create a signature that can match the reply/response traffic and combine them,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Attacker:10.63.212.201 vicitm:10.10.228.94 (reponse traffic should be from 10.10.228.94 to 10.63.212.201)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 13:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125260#M141</guid>
      <dc:creator>kowu</dc:creator>
      <dc:date>2016-11-09T13:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125262#M142</link>
      <description>&lt;P&gt;please filter the ip address in the pcap file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Attacker:10.63.212.201&amp;nbsp; http server:10.10.228.94&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 13:16:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125262#M142</guid>
      <dc:creator>kowu</dc:creator>
      <dc:date>2016-11-09T13:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125344#M143</link>
      <description>&lt;P&gt;any advise?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 18:51:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/125344#M143</guid>
      <dc:creator>kowu</dc:creator>
      <dc:date>2016-11-09T18:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: help on Custom  signature base on the return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/126781#M145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I never tried it, but I guess you&amp;nbsp;could create a new vulnerability that looks at the HTTP response code 200 (http-rsp-code equals 200) and JBoss HTTP header (Pattern match http-rsp-headers on X-Powered-by ...). You could then create a combination signature that includes threat ID 38507&amp;nbsp;with the new signature you made.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 16:06:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/help-on-custom-signature-base-on-the-return-traffic/m-p/126781#M145</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2016-11-16T16:06:23Z</dc:date>
    </item>
  </channel>
</rss>

