<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerability signature with payload and negate in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385967#M374</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I did some other tests...&lt;/P&gt;&lt;P&gt;Yes, this we can read in some manual, but on the other hand, we can also read, that this is dependent on the parent application. These packet payloads signatures of course are not. Anyway, I tried at the end everything to turn on and it did not help. And even the property I am matching is unknown-req-udp-payload. Maybe this unknown is important &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;So I ended with this question.&lt;/P&gt;&lt;P&gt;Yes, you are right again. But after 20 or so packets, this signature does not work anymore. My signature will drop the session if a vulnerability is found in the first 20 packets only. I would like to inspect every packet in the UDP stream.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Feb 2021 15:05:38 GMT</pubDate>
    <dc:creator>MCervenka</dc:creator>
    <dc:date>2021-02-15T15:05:38Z</dc:date>
    <item>
      <title>vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385836#M372</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I'm trying to write a custom app and vulnerability signature. Signatures are based on UDP-payload.&lt;/P&gt;&lt;P&gt;When I use the custom app signature, vulnerability detection does not work. Can I somehow turn on CTD for the custom app?&lt;/P&gt;&lt;P&gt;The other problem is that what I ideally need to do in the vulnerability is to check for the other than mine UDP-payload. So I was thinking about matching "\xaabbccddee\x" with negating turned on and "\xaabbccdd\x" in the payload in one vulnerability signature. But this does not work either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2021 23:17:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385836#M372</guid>
      <dc:creator>MCervenka</dc:creator>
      <dc:date>2021-02-14T23:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385962#M373</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can enable CTD inspection for the custom app by enabling "scanning" in the advanced tab of the signature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the negate condition in custom threat signatures, there are some restrictions.&amp;nbsp; One is that it can not be the only match condition.&amp;nbsp; At least one non-negate condition must be included.&amp;nbsp; Also, if the signature scope is "session" the negate condition can not be the last match condition.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 14:43:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385962#M373</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2021-02-15T14:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385967#M374</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I did some other tests...&lt;/P&gt;&lt;P&gt;Yes, this we can read in some manual, but on the other hand, we can also read, that this is dependent on the parent application. These packet payloads signatures of course are not. Anyway, I tried at the end everything to turn on and it did not help. And even the property I am matching is unknown-req-udp-payload. Maybe this unknown is important &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;So I ended with this question.&lt;/P&gt;&lt;P&gt;Yes, you are right again. But after 20 or so packets, this signature does not work anymore. My signature will drop the session if a vulnerability is found in the first 20 packets only. I would like to inspect every packet in the UDP stream.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 15:05:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385967#M374</guid>
      <dc:creator>MCervenka</dc:creator>
      <dc:date>2021-02-15T15:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385981#M375</link>
      <description>&lt;P&gt;&amp;nbsp;I don't think it's possible to configure a custom threat signature using the "unknown" protocol decoder that will inspect every packet for the entire duration of the flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are some improvements to the threat inspection process in PAN-OS 10 and so if you can run that version you might try using the "udp context free" decoder for your custom threat signature to see if there is a difference.&amp;nbsp; Note that use of this context will incur a significant performance penalty.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 17:15:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385981#M375</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2021-02-15T17:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385995#M376</link>
      <description>&lt;P&gt;Thank you Claudec. I will try. But as I read before, this will gives us an opportunity to search in the headers?&lt;/P&gt;&lt;P&gt;Anyway, I will try it and post the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 20:40:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385995#M376</guid>
      <dc:creator>MCervenka</dc:creator>
      <dc:date>2021-02-15T20:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability signature with payload and negate</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385998#M377</link>
      <description>&lt;P&gt;Same results, unfortunately.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 21:02:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/vulnerability-signature-with-payload-and-negate/m-p/385998#M377</guid>
      <dc:creator>MCervenka</dc:creator>
      <dc:date>2021-02-15T21:02:12Z</dc:date>
    </item>
  </channel>
</rss>

