Can someone provide documentation and insight in regards to creating custom IPS signatures based on the follow scenario?
Consider you have an FTP server. The USER command is vulnerable to buffer overflow. How does one create a custom signature to identify and block this activity?
The buffer and payload the attack sends could have 1000 variations.
I think such vulnerability should already be covered in the stock signatures in threat database. I searched through threat vault for some of the USER command overflow buffer vulnerabilities and found the following:
Does the threat database not cover the specific vulnerability you are looking for ?
As oppose to being on a specific vulnerability, this is more a general inquire to try to understand how the IDS signatures work. In preparation for the need to create custom ones. And I know for sure that FTP USER overflow list is missing a few.
I created a new thread in DevCenter
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!