#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)

Added 2008-03-28 13:39:32 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)

Added 2008-03-28 13:39:32 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)

Added 2008-03-22 17:48:04 UTC

This is now disabled by default in the ruleset. Gzip is used in some cases, more than expected. So use this if you have a need, but in general use it's not recommended.

-- MattJonkman - 28 Mar 2008


Topic revision: r2 - 2008-03-28 - MattJonkman
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats