Snort Exercise
Published on 30 Dec 2018
  
  Use wireshark to identify what types of behavior are happening in each of the following pcap samples
There are at least 3 different actions.
Run Snort with the capture
- Create an empty rules file named fullstack.rules, and an empty directory named logs
- Run snort -l ./logs -c fullstack.rules -r captured.pcap
- Snort should exit cleanly. There may be warnings, but no errors should occur
Writing Rules
- Work through How to Write Rules
- Research how to set logging/alerting modes in Snort, to configure ways to see the alert output.
- Create an alert for any ping traffic incoming to your machine; add this rule into your fullstack.rules file.
- Capture packets that contain Metasploitable pinging your Kali machine, then replay that capture through Snort. Observe the alerts from #3 in the snort output.
Creating SNORT ICMP rule
alert icmp any any <> any any (msg:"ICMP test"; sid:1000001)
Alerting on scans
root@kali:/media/sf_Downloads# snort -l ./logs -c fullstack.rules -r Metasploit-traffic.pcap 
Running in IDS mode
        --== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "fullstack.rules"
Tagged Packet Limit: 256
Log directory = ./logs
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
1 Snort rules read
    1 detection rules
    0 decoder rules
    0 preprocessor rules
1 Option Chains linked into 1 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
+-------------------[Rule Port Counts]---------------------------------------
|             tcp     udp    icmp      ip
|     src       0       0       0       0
|     dst       0       0       0       0
|     any       0       0       1       0
|      nc       0       0       1       0
|     s+d       0       0       0       0
+----------------------------------------------------------------------------
+-----------------------[detection-filter-config]------------------------------
| memory-cap : 1048576 bytes
+-----------------------[detection-filter-rules]-------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[rate-filter-config]-----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[rate-filter-rules]------------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[event-filter-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[event-filter-global]----------------------------------
+-----------------------[event-filter-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Verifying Preprocessor Configurations!
[ Port Based Pattern Matching Memory ]
pcap DAQ configured to read-file.
Acquiring network traffic from "Metasploit-traffic.pcap".
Reload thread starting...
Reload thread started, thread 0x7ff0ae738700 (2980)
        --== Initialization Complete ==--
   ,,_     -*> Snort! <*-
  o"  )~   Version 2.9.7.0 GRE (Build 149) 
   ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
           Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
           Copyright (C) 1998-2013 Sourcefire, Inc., et al.
           Using libpcap version 1.8.1
           Using PCRE version: 8.39 2016-06-14
           Using ZLIB version: 1.2.11
===============================================================================
Run time for packet processing was 1.1664 seconds
Snort processed 2282 packets.
Snort ran for 0 days 0 hours 0 minutes 1 seconds
   Pkts/sec:         2282
===============================================================================
Memory usage summary:
  Total non-mmapped bytes (arena):       2260992
  Bytes in mapped regions (hblkhd):      17117184
  Total allocated space (uordblks):      2066976
  Total free space (fordblks):           194016
  Topmost releasable block (keepcost):   40128
===============================================================================
Packet I/O Totals:
   Received:         2282
   Analyzed:         2282 (100.000%)
    Dropped:            0 (  0.000%)
   Filtered:            0 (  0.000%)
Outstanding:            0 (  0.000%)
   Injected:            0
===============================================================================
Breakdown by protocol (includes rebuilt packets):
        Eth:         2282 (100.000%)
       VLAN:            0 (  0.000%)
        IP4:         2222 ( 97.371%)
       Frag:            0 (  0.000%)
       ICMP:           16 (  0.701%)
        UDP:           38 (  1.665%)
        TCP:         2133 ( 93.471%)
        IP6:           49 (  2.147%)
    IP6 Ext:           84 (  3.681%)
   IP6 Opts:           35 (  1.534%)
      Frag6:            0 (  0.000%)
      ICMP6:           35 (  1.534%)
       UDP6:           14 (  0.613%)
       TCP6:            0 (  0.000%)
     Teredo:            0 (  0.000%)
    ICMP-IP:            0 (  0.000%)
    IP4/IP4:            0 (  0.000%)
    IP4/IP6:            0 (  0.000%)
    IP6/IP4:            0 (  0.000%)
    IP6/IP6:            0 (  0.000%)
        GRE:            0 (  0.000%)
    GRE Eth:            0 (  0.000%)
   GRE VLAN:            0 (  0.000%)
    GRE IP4:            0 (  0.000%)
    GRE IP6:            0 (  0.000%)
GRE IP6 Ext:            0 (  0.000%)
   GRE PPTP:            0 (  0.000%)
    GRE ARP:            0 (  0.000%)
    GRE IPX:            0 (  0.000%)
   GRE Loop:            0 (  0.000%)
       MPLS:            0 (  0.000%)
        ARP:           11 (  0.482%)
        IPX:            0 (  0.000%)
   Eth Loop:            0 (  0.000%)
   Eth Disc:            0 (  0.000%)
   IP4 Disc:            0 (  0.000%)
   IP6 Disc:            0 (  0.000%)
   TCP Disc:            0 (  0.000%)
   UDP Disc:            0 (  0.000%)
  ICMP Disc:            0 (  0.000%)
All Discard:            0 (  0.000%)
      Other:           35 (  1.534%)
Bad Chk Sum:           66 (  2.892%)
    Bad TTL:            0 (  0.000%)
     S5 G 1:            0 (  0.000%)
     S5 G 2:            0 (  0.000%)
      Total:         2282
===============================================================================
Action Stats:
     Alerts:           51 (  2.235%)
     Logged:           51 (  2.235%)
     Passed:            0 (  0.000%)
Limits:
      Match:            0
      Queue:            0
        Log:            0
      Event:            0
      Alert:            0
Verdicts:
      Allow:         2282 (100.000%)
      Block:            0 (  0.000%)
    Replace:            0 (  0.000%)
  Whitelist:            0 (  0.000%)
  Blacklist:            0 (  0.000%)
     Ignore:            0 (  0.000%)
      Retry:            0 (  0.000%)
===============================================================================
Snort exiting
Alert Log
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:15:26.375082 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:15:26.392366 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:15:26.392728 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:15:26.392898 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:15:26.467826 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:26.479263 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:26.495623 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:26.495903 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:26.496129 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:26.497909 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:34.925956 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6481 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:1  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:34.926116 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41752 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:1  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:35.934962 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6715 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:2  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:35.935280 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41753 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:2  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:36.956284 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:6918 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:3  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:36.956673 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41754 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:3  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:37.980246 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7098 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:4  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:37.980653 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41755 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:4  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:39.003843 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7162 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:5  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:39.004255 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41756 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:5  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:40.028270 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7301 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:6  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:40.028610 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41757 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:6  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:41.051811 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7457 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:7  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:41.052176 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41758 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:7  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:42.105399 192.168.56.105 -> 192.168.56.106
ICMP TTL:64 TOS:0x0 ID:7674 IpLen:20 DgmLen:84 DF
Type:8  Code:0  ID:2328   Seq:8  ECHO
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:16:42.105695 192.168.56.106 -> 192.168.56.105
ICMP TTL:64 TOS:0x0 ID:41759 IpLen:20 DgmLen:84
Type:0  Code:0  ID:2328  Seq:8  ECHO REPLY
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:17:26.584421 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:17:26.600969 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:17:26.601365 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:17:26.601480 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:17:27.027796 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:18:26.689449 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:18:26.705963 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:18:26.706308 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:18:26.706463 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:18:27.058380 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:19:26.786086 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:19:26.802567 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:19:26.802901 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:19:26.803124 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:19:27.088090 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:20:26.892874 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:20:26.909513 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:20:26.909968 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:20:26.910094 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:20:27.117725 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:21:27.003522 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:21:27.020210 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:21:27.020930 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:21:27.020941 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
[**] [1:1000001:0] ICMP test [**]
[Priority: 0] 
08/26-11:21:27.148341 fe80::d1f6:20da:38e1:e591 -> ff02::16
IPV6-ICMP TTL:1 TOS:0x0 ID:256 IpLen:40 DgmLen:76
 Welcome to my blog where I write about Threat Hunting, Pentesting and Cybersecurity in general.
Welcome to my blog where I write about Threat Hunting, Pentesting and Cybersecurity in general.