- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-09-2014 01:53 PM
Can someone provide documentation and insight in regards to creating custom IPS signatures based on the follow scenario?
Consider you have an FTP server. The USER command is vulnerable to buffer overflow. How does one create a custom signature to identify and block this activity?
The buffer and payload the attack sends could have 1000 variations.
09-09-2014 02:11 PM
Further info.. if the vulnerability is simple triggered by sending over 20 characters to it...
An attacker could send 100 A's. We could easily build a signature that watches for 100 \x41. But if they sent a payload of 100 \x42 and caused the crash, the custom signature would not match.
09-09-2014 02:33 PM
Hi SDorsey
I think such vulnerability should already be covered in the stock signatures in threat database. I searched through threat vault for some of the USER command overflow buffer vulnerabilities and found the following:
Does the threat database not cover the specific vulnerability you are looking for ?
Thanks
09-09-2014 03:51 PM
As oppose to being on a specific vulnerability, this is more a general inquire to try to understand how the IDS signatures work. In preparation for the need to create custom ones. And I know for sure that FTP USER overflow list is missing a few.
I created a new thread in DevCenter
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!