<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: malware using encrypted (SSH) transfer over tcp/443 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49125#M36190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to packet capture the traffic for that.&lt;/P&gt;&lt;P&gt;if you can, it is possible to add custom signature from objects/custom signature tab.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Jul 2013 18:24:51 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2013-07-03T18:24:51Z</dc:date>
    <item>
      <title>malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49122#M36187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does Palo Alto have a signature to detect the use of ssh on non-standard ports like 443? I did not see anything in the threat database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 16:46:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49122#M36187</guid>
      <dc:creator>jmayne</dc:creator>
      <dc:date>2013-07-03T16:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49123#M36188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see a signature for that.&lt;/P&gt;&lt;P&gt;you can use security rule with application default to allow only it's default port for ssh or using services with that rule for other ports.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 18:15:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49123#M36188</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-07-03T18:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49124#M36189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. I will give that a try. Is it possible to request new signatures and if so how would I do that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 18:19:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49124#M36189</guid>
      <dc:creator>jmayne</dc:creator>
      <dc:date>2013-07-03T18:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49125#M36190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to packet capture the traffic for that.&lt;/P&gt;&lt;P&gt;if you can, it is possible to add custom signature from objects/custom signature tab.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 18:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49125#M36190</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-07-03T18:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49126#M36191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As panos said, that's a rule not a signature. Going back, you can go to Monitor-&amp;gt;Traffic and search for (port eq 443) and (app neq ssl) or perhaps (port neq 22) and (app eq ssh).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While you're in the neighborhood, if you have a loose policy and are creating denies, also consider a rule to deny things like crossloop, gre, hamachi, ipsec, ipv6, teredo, and an application filter that looks for subcategory=proxy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 20:58:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49126#M36191</guid>
      <dc:creator>rgraves</dc:creator>
      <dc:date>2013-07-03T20:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: malware using encrypted (SSH) transfer over tcp/443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49127#M36192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great advise. Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jul 2013 12:44:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malware-using-encrypted-ssh-transfer-over-tcp-443/m-p/49127#M36192</guid>
      <dc:creator>jmayne</dc:creator>
      <dc:date>2013-07-05T12:44:52Z</dc:date>
    </item>
  </channel>
</rss>

