- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-18-2014 06:24 AM
Hi.. all
Do you know "dodge chrome"?
This is bypass the url filtering by the modified google chrome.
(http method : get \r\n )
I do not find the related signature in palo alto applipdia.(app-id , ips , virus)
How to block dodge chrome?
09-18-2014 04:28 PM
Finally found a build of DodgeChrome with some google-fu and did some testing. Traffic generated by this client is identified as unknown-tcp by the firewall, not web-browsing. If you block unknown-tcp the client will be unable to transfer data.
Custom signatures will not be possible for this because the string you are looking for is less than 7 bytes, and with the session identified as unknown-tcp you can not utilize HTTP contexts for pattern matching.
09-18-2014 07:27 AM
Hello Wooki,
Could you please go through this doc:
Enabling Strip X-Forward-For Feature Blocks Communications to Certain Websites
Did you try the custom signature to block this:
Creating Custom Threat Signatures
Thanks
09-18-2014 08:37 AM
You can probably do a packet capture and modify this procedure that blocks Chrome to be unique for Dodge Chrome.
09-18-2014 04:28 PM
Finally found a build of DodgeChrome with some google-fu and did some testing. Traffic generated by this client is identified as unknown-tcp by the firewall, not web-browsing. If you block unknown-tcp the client will be unable to transfer data.
Custom signatures will not be possible for this because the string you are looking for is less than 7 bytes, and with the session identified as unknown-tcp you can not utilize HTTP contexts for pattern matching.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!