<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to make custom signature with segment field? in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68834#M24</link>
    <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Recently, URL filter evasion application often use tcp segment field.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;How to&amp;nbsp;make custom application with tcp segment field?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Protocol sequence.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1. SYN&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2. SYN,ACK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;3. ACK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;4. PSH,ACK : TCP segment data has GET / HTTP/1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1414i4C7D46FB92FF8F2F/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="dodgechrome_tcp_segment.png" title="dodgechrome_tcp_segment.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;It can bypass our URL filtering.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;You&amp;nbsp;can download and reproduce using below link.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&lt;A href="http://1bil.net/DodgeChrome-31.zip" target="_blank"&gt;http://1bil.net/DodgeChrome-31.zip&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;Thanks.&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Dec 2015 07:14:57 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2015-12-01T07:14:57Z</dc:date>
    <item>
      <title>How to make custom signature with segment field?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68834#M24</link>
      <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Recently, URL filter evasion application often use tcp segment field.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;How to&amp;nbsp;make custom application with tcp segment field?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Protocol sequence.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1. SYN&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2. SYN,ACK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;3. ACK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;4. PSH,ACK : TCP segment data has GET / HTTP/1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1414i4C7D46FB92FF8F2F/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="dodgechrome_tcp_segment.png" title="dodgechrome_tcp_segment.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;It can bypass our URL filtering.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;You&amp;nbsp;can download and reproduce using below link.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&lt;A href="http://1bil.net/DodgeChrome-31.zip" target="_blank"&gt;http://1bil.net/DodgeChrome-31.zip&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;Thanks.&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 07:14:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68834#M24</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2015-12-01T07:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to make custom signature with segment field?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68851#M25</link>
      <description>&lt;P&gt;bkim:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given that the traffic is being classified as "unknown-tcp," you may be able to write signatures to pick off at least one of the methods being used in this app, by inspecting unknown-req-tcp-payload for some specific strings indicative of HTTP traffic. (GET / HTTP/1.1, etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, the obvious quick and blunt solution would be, "Don't allow unknown-tcp traffic" to egress to the web, which appears to defeat this tool entirely. This is probably a better solution than writing custom signatures.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 14:51:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68851#M25</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-12-01T14:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to make custom signature with segment field?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68893#M27</link>
      <description>&lt;P&gt;Bkim;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree with rcole.&amp;nbsp; If the evasion technique creates an unknown application&amp;nbsp;&amp;nbsp;then you should already have policies in place to deny unknown udp and tcp traffic. While a signature (if possible ) would work in this situation the more encompasing approach would be to block unknown apps as mentioned. If the traffic causes a url category of "unknown" to be generated then you should deal with that situation within yout URL filtering policy.&amp;nbsp; Signatures are great for specific or unique traffic patterns when other methods can't address the problem / situation. Glad you thinking out of the box.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 02:28:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-make-custom-signature-with-segment-field/m-p/68893#M27</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-12-02T02:28:28Z</dc:date>
    </item>
  </channel>
</rss>

