Snort Exercise
Published on 30 Dec 2018
Use wireshark to identify what types of behavior are happening in each of the following pcap samples
There are at least 3 different actions.
Run Snort with the capture
- Create an empty rules file named fullstack.rules, and an empty directory named logs
- Run snort -l ./logs -c fullstack.rules -r captured.pcap
- Snort should exit cleanly. There may be warnings, but no errors should occur
Writing Rules
- Work through How to Write Rules
- Research how to set logging/alerting modes in Snort, to configure ways to see the alert output.
- Create an alert for any ping traffic incoming to your machine; add this rule into your fullstack.rules file.
- Capture packets that contain Metasploitable pinging your Kali machine, then replay that capture through Snort. Observe the alerts from #3 in the snort output.
Creating SNORT ICMP rule
alert icmp any any <> any any (msg:"ICMP test"; sid:1000001)
Alerting on scans
root@kali:/media/sf_Downloads# snort -l ./logs -c fullstack.rules -r Metasploit-traffic.pcap
Running in IDS mode
--== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "fullstack.rules"
Tagged Packet Limit: 256
Log directory = ./logs
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
1 Snort rules read
1 detection rules
0 decoder rules
0 preprocessor rules
1 Option Chains linked into 1 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
+-------------------[Rule Port Counts]---------------------------------------
| tcp udp icmp ip
| src 0 0 0 0
| dst 0 0 0 0
| any 0 0 1 0
| nc 0 0 1 0
| s+d 0 0 0 0
+----------------------------------------------------------------------------
+-----------------------[detection-filter-config]------------------------------
| memory-cap : 1048576 bytes
+-----------------------[detection-filter-rules]-------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[rate-filter-config]-----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[rate-filter-rules]------------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[event-filter-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[event-filter-global]----------------------------------
+-----------------------[event-filter-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Verifying Preprocessor Configurations!
[ Port Based Pattern Matching Memory ]
pcap DAQ configured to read-file.
Acquiring network traffic from "Metasploit-traffic.pcap".
Reload thread starting...
Reload thread started, thread 0x7ff0ae738700 (2980)
--== Initialization Complete ==--
,,_ -*> Snort! <*-
o" )~ Version 2.9.7.0 GRE (Build 149)
'''' By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Using libpcap version 1.8.1
Using PCRE version: 8.39 2016-06-14
Using ZLIB version: 1.2.11
===============================================================================
Run time for packet processing was 1.1664 seconds
Snort processed 2282 packets.
Snort ran for 0 days 0 hours 0 minutes 1 seconds
Pkts/sec: 2282
===============================================================================
Memory usage summary:
Total non-mmapped bytes (arena): 2260992
Bytes in mapped regions (hblkhd): 17117184
Total allocated space (uordblks): 2066976
Total free space (fordblks): 194016
Topmost releasable block (keepcost): 40128
===============================================================================
Packet I/O Totals:
Received: 2282
Analyzed: 2282 (100.000%)
Dropped: 0 ( 0.000%)
Filtered: 0 ( 0.000%)
Outstanding: 0 ( 0.000%)
Injected: 0
===============================================================================
Breakdown by protocol (includes rebuilt packets):
Eth: 2282 (100.000%)
VLAN: 0 ( 0.000%)
IP4: 2222 ( 97.371%)
Frag: 0 ( 0.000%)
ICMP: 16 ( 0.701%)
UDP: 38 ( 1.665%)
TCP: 2133 ( 93.471%)
IP6: 49 ( 2.147%)
IP6 Ext: 84 ( 3.681%)
IP6 Opts: 35 ( 1.534%)
Frag6: 0 ( 0.000%)
ICMP6: 35 ( 1.534%)
UDP6: 14 ( 0.613%)
TCP6: 0 ( 0.000%)
Teredo: 0 ( 0.000%)
ICMP-IP: 0 ( 0.000%)
IP4/IP4: 0 ( 0.000%)
IP4/IP6: 0 ( 0.000%)
IP6/IP4: 0 ( 0.000%)
IP6/IP6: 0 ( 0.000%)
GRE: 0 ( 0.000%)
GRE Eth: 0 ( 0.000%)
GRE VLAN: 0 ( 0.000%)
GRE IP4: 0 ( 0.000%)
GRE IP6: 0 ( 0.000%)
GRE IP6 Ext: 0 ( 0.000%)
GRE PPTP: 0 ( 0.000%)
GRE ARP: 0 ( 0.000%)
GRE IPX: 0 ( 0.000%)
GRE Loop: 0 ( 0.000%)
MPLS: 0 ( 0.000%)
ARP: 11 ( 0.482%)
IPX: 0 ( 0.000%)
Eth Loop: 0 ( 0.000%)
Eth Disc: 0 ( 0.000%)
IP4 Disc: 0 ( 0.000%)
IP6 Disc: 0 ( 0.000%)
TCP Disc: 0 ( 0.000%)
UDP Disc: 0 ( 0.000%)
ICMP Disc: 0 ( 0.000%)
All Discard: 0 ( 0.000%)
Other: 35 ( 1.534%)
Bad Chk Sum: 66 ( 2.892%)
Bad TTL: 0 ( 0.000%)
S5 G 1: 0 ( 0.000%)
S5 G 2: 0 ( 0.000%)
Total: 2282
===============================================================================
Action Stats:
Alerts: 51 ( 2.235%)
Logged: 51 ( 2.235%)
Passed: 0 ( 0.000%)
Limits:
Match: 0
Queue: 0
Log: 0
Event: 0
Alert: 0
Verdicts:
Allow: 2282 (100.000%)
Block: 0 ( 0.000%)
Replace: 0 ( 0.000%)
Whitelist: 0 ( 0.000%)
Blacklist: 0 ( 0.000%)
Ignore: 0 ( 0.000%)
Retry: 0 ( 0.000%)
===============================================================================
Snort exiting
Alert Log
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:15:26.375082 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:15:26.392366 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:15:26.392728 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:15:26.392898 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:15:26.467826 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:26.479263 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:26.495623 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:26.495903 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:26.496129 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:26.497909 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:34.925956 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6481 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:1 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:34.926116 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41752 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:1 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:35.934962 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6715 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:2 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:35.935280 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41753 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:2 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:36.956284 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6918 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:3 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:36.956673 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41754 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:3 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:37.980246 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7098 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:4 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:37.980653 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41755 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:4 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:39.003843 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7162 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:5 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:39.004255 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41756 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:5 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:40.028270 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7301 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:6 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:40.028610 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41757 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:6 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:41.051811 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7457 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:7 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:41.052176 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41758 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:7 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:42.105399 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7674 IpLen:20 DgmLen:84 DF
Type:8 Code:0 ID:2328 Seq:8 ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:16:42.105695 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41759 IpLen:20 DgmLen:84
Type:0 Code:0 ID:2328 Seq:8 ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:17:26.584421 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:17:26.600969 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:17:26.601365 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:17:26.601480 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:17:27.027796 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:18:26.689449 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:18:26.705963 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:18:26.706308 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:18:26.706463 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:18:27.058380 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:19:26.786086 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:19:26.802567 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:19:26.802901 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:19:26.803124 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:19:27.088090 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:20:26.892874 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:20:26.909513 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:20:26.909968 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:20:26.910094 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:20:27.117725 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:21:27.003522 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:21:27.020210 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:21:27.020930 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:21:27.020941 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0]
08/26-11:21:27.148341 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76