Signature Format |
T D A S 10 20 80 WEB:CGI-PHF get/20/2fcgi-bin/2fphf | | | | | | | | | | | | | | | | | | | | | | | | | | SEARCH STRING | | | | | | | EVENT NAME | | | | | | PORT | | | | | | | | | | | COMPARE BYTES | | | | | | | | | DYNAMIC LOG | | | | | | | BINARY OR STRING | | | | | PROTECTED NETWORKS | | | DIRECTION | PROTOCOL FIELD 1: PROTOCOL
A 'ALL' All traffic T 'TO' Not from protected networks and going to them F 'FROM' Not to protected networks and leaving from them I 'INSIDE' From and to protected networks X 'EXTERIOR' Not from and not to protected networks D 'DYNAMIC' Traffic occurring in 'follow-on' traffic from a previous eventThe example above uses an 'A' to watch all traffic. This detects PHF attacks on any server regardless if it is on a protected network or not. To detect attacks only from sources outside the protected networks, a 'T' could have been specified.
The 'D' setting is the most complex type of signature.
When an event such as a PHF attack occurs, it is followed by several packets
that complete the sessions. Maybe the attack fails. Maybe the attack works.
Regardless, this follow-on data is worth analyzing and a signature designed
specifically to look at this data is very useful. Consider the following
signature: This signature looks for generic responses to web servers which have returned
an error from a page which was attempted access. This type of traffic probably
occurs a lot on any modern web server farm simply due to stale URLs and poorly
managed web servers. However, consider the fact that previous to this event, the
request may have been for a URL looking for the PHF attack.
In this case, applying this 'FAIL:WEB-FORBIDDEN' rule to the follow on traffic from the
web server and attacker is very interesting. Without these rules, the PHF attack
may be logged an alerted, but it requires much more raw analysis to determine
the success or failure of the attack. Consider the following log from a FTP
server which has been logged into by a 'root' user:
T S D B 0 0 80 FAIL:WEB-FORBIDDEN 403/20Forbidden
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---A----)
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---AP---)
02:57:54 [T] 95.23.135.1 25.25.79.151 [DYNAMIC-TCP] (tcp,sp=3106,dp=21,flags=---AP---)
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---AP---)
02:57:55 [T] 95.23.135.1 25.25.79.151 [DYNAMIC-TCP] (tcp,sp=3106,dp=21,flags=---A----)
All of the follow-on packets marked with DYNAMIC-TCP listed, but in order to
know what is happening with this session, we would have to use the mksession
tool or inspect each packet manually. Consider if we had added the following
signature to the dragon.sigs file:
T S D B 10 200 21 FTP:ROOT-LOGGED-IN 230/20User/20root/20logged/20in
This signature includes a 'D' for the third field which looks for port 21
DYNAMIC data. The search string is a positive login banner generated by 'wu-ftd
2.4.2' and is used as an example. With this signature running, we would get the
following output logged:
02:57:54 [T] 95.23.135.1 25.25.79.151
[FTP:USER-ROOT](tcp,dp=21,sp=3106)
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---A----)
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---AP---)
02:57:54 [T] 95.23.135.1 25.25.79.151 [DYNAMIC-TCP] (tcp,sp=3106,dp=21,flags=---AP---)
02:57:54 [F] 25.25.79.151 95.23.135.1 [DYNAMIC-TCP] (tcp,sp=21,dp=3106,flags=---AP---)
[FTP:ROOT-LOGGED-IN]
02:57:55 [T] 95.23.135.1 25.25.79.151 [DYNAMIC-TCP] (tcp,sp=3106,dp=21,flags=---A----)
FIELD 4: BINARY OR CASE INSENSITIVE SEARCH
Search strings can be case insensitive for the printable character range. For example, most web servers will respond to 'GET' requests as well as 'get' requests.
Dragon Sensor administrators could use two different rules to search for this, but there is a better way. By specifying an 'S' as the fourth argument,
Dragon Sensor will search for all cases of the string regardless of upper or lower case characters.
It is important for these strings that all printable characters be in lower
case. Dragon Sensor converts the data to be searched to lower case and then attempts to match it with the rule's search string. If the rule's search string has upper case letters, then the strings will never match. This string will never match because of the capital 'G'.:
6 D A S 10 20 80 WEB:CGI-PHF Get/20/2fcgi-bin/2fphf
WEBCONVERT and TELCONVERT
processing only works on rules that are written to search for complex web ports with string ('S') searches. The PHF signature may be rewritten to make use of the complex web rules by substituting a 'W' for port 80. The character 'W' is defined in the
COMPLEX web rules in the dragon.net file and usually is associated with ports 80, squid proxies and 8080. Here is the rewritten rule:
6 D A S 10 20 W WEB:CGI-PHF get/20/2fcgi-bin/2fphf
To use binary comparison, specify a 'B'. This will search for an exact match of the search
string, including all unique uppercase and lowercase characters.
FIELD 5: DYNAMIC LOG
|
This-is-a-test-string This/2dis/2da/2dtest/2dstring /2fcgi-bin/2fphf For example, the question mark can be used as a single character wildcard. This wildcard will match anything regardless of what the value is. Something has to be there though. If the amount of captured data ends before a wildcard matches, then no match occurs. To search for a question mark, use the hex code of 0x3f. Here is the above example where we replace spot with any four-letter word. see/20????/20run/0a see/20 , run/0a /2fcgi-bin/2f , /2fetc/2fpasswd USER/20 >
256
When a hit on a particular rule occurs, Dragon Sensor can be told to collect additional packets between the source and destination IP addresses of the event. For example, for a Telnet login failure,
Dragon Sensor could be specified to grab the next 50 packets between the Telnet server and the IP address that had the login failure. This allows a greater level of analysis to be applied to a security event. It is recommended not to collect more than 100 packets per event for performance reasons. The amount of packets to collect is specified as an integer. The above example collects ten packets after each PHF attempt. It's important to note that the amount of DYNAMIC collection is a fixed resource and uses the 'least recently used' principal. That is, only the latest attacks have their additional traffic logged.
FIELD 6: BYTES TO COMPARE
As packets are collected by Dragon Sensor, it needs to know how far into each packet it should search for a match for this signature. This assumes that the interesting data is usually closest to the beginning of the packet. For example, URL web addresses are at the beginning of each packet. By telling
Dragon Sensor to only look at the first 40 bytes, we avoid searching unnecessary portions of the packet. However, searching entire packets may be the right choice for certain types of attacks such as buffer overflows because their data signatures tend to be at the end of most packets. The number of bytes to compare is expressed as an integer. Use a zero to tell
Dragon Sensor to search the entire packet.
In our example above, we tell Dragon Sensor to search the first twenty bytes of the packet for a match. It is not necessary to attempt to get this number exactly the same length as the search string. There seem to be 16 characters in the example search string. As long as the number of compare bytes is equal to or slightly greater than the length of the search string,
Dragon Sensor performance has been optimized.
If an attempt to match a signature fails because the search signature is longer than the captured data, the collected data gets sent to a session reconstruction engine. As more data arrives, it to gets sent to the reconstruction engine until a complex set of rules determines that the collected data should be reevaluated for matches with the
dragon.sigs rules.
FIELD 7: PORT
For UDP or TCP signatures, a port value is used to specify which particular protocol to apply the signature to. To specify a port value, use the numeric representation of the protocol. In other words, use 25 for SMTP, 80 for HTTP, 6000 for X Windows and so on. To specify more complex ranges of ports, please review the
COMPLEX port format specified in the dragon.net
file. These complex port rules are identified with capital letters such as 'X' and
'W'. Simply placing those letters in this part of a signature applies the complex rule to the signature. This field is ignored for protocols other than UDP and TCP.
FIELD 8: NAME
The name of the signature that Dragon Sensor is searching for is expressed as a string. There can be any combination of characters, but there can not be any spaces. The
'dragon.sigs' examples have a loose organization to naming attacks, but there is no reason that these can not be modified. There is no limit to the size of the names either, but smaller lengths take less memory and result in better performance. The above example uses a name of
'WEB:CGI-PHF'. We could have just as easily used 'STUPID-WEB-HACK-PHF' or 'PHF-SCRIPT-KIDDY'.
FIELD 9: SEARCH STRING
Dragon Sensor has several string definition features which allow for creation of powerful, yet efficient pattern searches.
The most basic string definition is to simply type a string of letters and numbers without any spaces such as this:
That really isn't to useful though because we can't specify any non-printable characters like carriage returns or null bytes. To get around this, we can use the '/' character as an escape character to specify two alphanumeric values which represent a hex number. The hex ASCII code for '-' is 0x2d which means that the above example could be represented like:
In order to search for a '/' character, simply use the hex value for '/' which is 0x2f. Here is a string that searches for
"/cgi-bin/phf":
To drive the point home, we can use the 0x20 character to represent a space. Here is "see spot run" followed by a
newline.
see/20spot/20run/0a
WILD CARDS
Starting in Dragon Sensor 4.1, there are four available wildcard characters. These
are the question mark, the pound sign, the dollar sign and the asterisk. All
wildcards represent a single byte which may be used to represent the following
ranges:
? - Any byte
* - Any printable character (Alpha-numerics, /n, /r, etc..)
$ - Any non printable character (negative of printable character set)
# - Any number
Because of this protocol, attempting to search for these
bytes (?,*,$,#) in normal traffic requires that the corresponding hex escape
code be used. Here is a table for quick access:
? - 0x3f
* - 0x2a
$ - 0x24
# - 0x23
COMBO STRINGS
Searching for this string and any four letter word followed by "/20run/0a" may be useful, but combining two different strings is even more useful.
Dragon Sensor's signatures can handle this by specifying an initial string and then a second string separated by a comma. If we want to search for the pattern "see/20" and then the pattern "/20run/0a" without any regard for the total number of bytes or content between the two strings, then the signature syntax would be as follows:
This is very useful as one could write a signature which looks for any "/cgi-bin/" query followed by interesting keywords such as "/etc/passwd", "/bin/mail" or "xterm -d ???". Here are these examples in
Dragon Sensor signature format:
/2fcgi-bin/2f , /2fbin/2fmail
/2fcgi-bin/2f , xterm/20-d???
BUFFER OVERFLOWS
Another Dragon Sensor signature format is designed to look for buffer overflows in ASCII style protocols. Protocols such as FTP and POP have an ASCII based communication such that users tend to log in with printable characters in response to prompts. This
Dragon Sensor signature format can look for keywords that specify the beginning of a login string followed by an unusually large string of data. For example, in FTP a user specifies their username with a command of "USER", which is followed by a space, which is then followed by a username. Most usernames are eight bytes long so searching for of usernames larger than 256 bytes could show some denial of service attacks and possibly some buffer overflows. The signature format specifies the initial search string, followed by a greater than sign followed by a number of bytes. Here is an example:
This searches for the string "USER/20" and then searches the remaining data for a newline. If more than 256 characters are found an event is recorded. Here is a complete
Dragon Sensor signature which looks for extra long usernames during FTP command sessions:
NEGATIVE SIGNATURES
Dragon Sensor can be configured to search for signatures based on the absence of data.
The original request for this feature originated from an electronic commerce web site. All of
their URLs were simple requests for '/' , or a web resource which had
their company name in the URL. A
typical URL may have included something like 'www.company.com/companyname/index.html'.
Any web queries which were not to '/' or did not contain '/companyname/' were
suspect.
Starting in version Dragon Sensor 4.0i, the concept of the negative signature was introduced. This signature format simply looked for an initial string, and then if it was not immediately followed by one or more different strings, then an event was logged. In the company's example above, the resulting string would look like this:
T D A B 30 50 80 WEB:MISMATCH GET/20 ! ( /2f/20 , /2fcompanyname/2f )
This string basically alerts on any string going to a web server on
port 80 which contains 'GET ' that is not immediately followed by a '/ ' (slash
and space) or by a '/companyname/'. The initial 'GET ' is required to match
before the subsequent negative matches are attempted. If we wanted to make
searching faster, we could modify the first negative signature component from
'/2f/20' to '/2f/20HTTP'. This is a much longer string which conforms to the
HTTP standard.
The follow-on data is matched exactly on the first byte after the initial
string. In the above example, if there was another character between the space
of the 'GET ' and the first slash of the '/companyname/' string, then the event
would not match. That is, the event would be logged because it was not an exact
match.
Another use of this type of string is to look for strange FTP login names on
anonymous FTP servers. Typically, the users 'ftp' and 'anonymous' are used to
log into an FTP server set up for public usage. A signature which would log for
users other than 'ftp' and 'anonymous' would look like:
T D A B 30 50 21 FTP:NOT-ANON USER/20 ! ( ftp , anonymous )
The possibilities with negative signatures are numerous. Another area
of usage is for looking at various network services which have gone out of spec.
For example, one could write a negative signature which looked for web servers
that were Windows NT IIS, but only version 3 and version 4. Versions 2 and 5
would be alerted on in this case as being to old, or to new.