⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 snort.conf

📁 This is the snapshot of Snot Latest Rules
💻 CONF
📖 第 1 页 / 共 3 页
字号:
# dynamicdetection file /usr/local/lib/snort_dynamicrule/p2p.so# dynamicdetection file /usr/local/lib/snort_dynamicrule/web-client.so##################################################### Step #3: Configure preprocessors## General configuration for preprocessors is of # the form# preprocessor <name_of_processor>: <configuration_options># frag3: Target-based IP defragmentation # --------------------------------------## Frag3 is a brand new IP defragmentation preprocessor that is capable of# performing "target-based" processing of IP fragments.  Check out the# README.frag3 file in the doc directory for more background and configuration# information.# # Frag3 configuration is a two step process, a global initialization phase # followed by the definition of a set of defragmentation engines.  # # Global configuration defines the number of fragmented packets that Snort can# track at the same time and gives you options regarding the memory cap for the# subsystem or, optionally, allows you to preallocate all the memory for the # entire frag3 system.## frag3_global options:#   max_frags: Maximum number of frag trackers that may be active at once.  #              Default value is 8192.#   memcap: Maximum amount of memory that frag3 may access at any given time.#           Default value is 4MB.#   prealloc_frags: Maximum number of individual fragments that may be processed#                   at once.  This is instead of the memcap system, uses static #                   allocation to increase performance.  No default value.  Each#                   preallocated fragment eats ~1550 bytes.## Target-based behavior is attached to an engine as a "policy" for handling # overlaps and retransmissions as enumerated in the Paxson paper.  There are# currently five policy types available: "BSD", "BSD-right", "First", "Linux" # and "Last".  Engines can be bound to standard Snort CIDR blocks or# IP lists.## frag3_engine options:#   timeout: Amount of time a fragmented packet may be active before expiring.#            Default value is 60 seconds.#   ttl_limit: Limit of delta allowable for TTLs of packets in the fragments. #              Based on the initial received fragment TTL.#   min_ttl: Minimum acceptable TTL for a fragment, frags with TTLs below this#            value will be discarded.  Default value is 0.#   detect_anomalies: Activates frag3's anomaly detection mechanisms.#   policy: Target-based policy to assign to this engine.  Default is Windows.#   bind_to: IP address set to bind this engine to.  Default is all hosts.## Frag3 configuration example:#preprocessor frag3_global: max_frags 65536 prealloc_frags 262144#preprocessor frag3_engine: policy linux \#                           bind_to [10.1.1.12/32,10.1.1.13/32] \#                           detect_anomalies#preprocessor frag3_engine: policy first \#                           bind_to 10.2.1.0/24 \#                           detect_anomalies#preprocessor frag3_engine: policy last \#                           bind_to 10.3.1.0/24#preprocessor frag3_engine: policy bsdpreprocessor frag3_global: max_frags 65536preprocessor frag3_engine: policy windows timeout 180# stream5: Target Based stateful inspection/stream reassembly for Snort# ---------------------------------------------------------------------# Stream5 is a target-based stream engine for Snort.  Its functionality# replaces that of Stream4.  Consequently, BOTH Stream4 and Stream5# cannot be used simultaneously.  Comment out the stream4 configurations# above to use Stream5.# # See README.stream5 for details on the configuration options.## Example config (that emulates Stream4 with UDP support compiled in)preprocessor stream5_global: max_tcp 8192, track_tcp yes, \                             track_udp yespreprocessor stream5_tcp: policy windows, use_static_footprint_sizes, \						  ports client 21 23 25 42 53 80 135 136 137 139 143 110 111 445 465 513 691 1433 1521 2100 2301 3128 3306 8000 8080 8180 8888preprocessor stream5_udp: ignore_any_rules# Performance Statistics# ----------------------# Documentation for this is provided in the Snort Manual.  You should read it.# It is included in the release distribution as doc/snort_manual.pdf# # preprocessor perfmonitor: time 300 file /var/snort/snort.stats pktcnt 10000# http_inspect: normalize and detect HTTP traffic and protocol anomalies## lots of options available here. See doc/README.http_inspect.# unicode.map should be wherever your snort.conf lives, or given# a full path to where snort can find it.preprocessor http_inspect: global iis_unicode_map unicode.map 1252 preprocessor http_inspect_server: \    server default \    apache_whitespace no \    ascii no \    bare_byte no \    chunk_length 500000 \    flow_depth 1460 \    directory no \    double_decode no \    iis_backslash no \    iis_delimiter no \    iis_unicode no \    multi_slash no \    non_strict \    oversize_dir_length 500 \    ports { 80 2301 3128 8000 8080 8180 8888 } \    u_encode yes \    non_rfc_char { 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07 } \    webroot no##  Example unique server configuration##preprocessor http_inspect_server: server 1.1.1.1 \#    ports { 80 3128 8080 } \#    flow_depth 0 \#    ascii no \#    double_decode yes \#    non_rfc_char { 0x00 } \#    chunk_length 500000 \#    non_strict \#    oversize_dir_length 300 \#    no_alerts# rpc_decode: normalize RPC traffic# ---------------------------------# RPC may be sent in alternate encodings besides the usual 4-byte encoding# that is used by default. This plugin takes the port numbers that RPC# services are running on as arguments - it is assumed that the given ports# are actually running this type of service. If not, change the ports or turn# it off.# The RPC decode preprocessor uses generator ID 106## arguments: space separated list# alert_fragments - alert on any rpc fragmented TCP data# no_alert_multiple_requests - don't alert when >1 rpc query is in a packet# no_alert_large_fragments - don't alert when the fragmented#                            sizes exceed the current packet size# no_alert_incomplete - don't alert when a single segment#                       exceeds the current packet sizepreprocessor rpc_decode: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779# bo: Back Orifice detector# -------------------------# Detects Back Orifice traffic on the network.## arguments:  #   syntax:#     preprocessor bo: noalert { client | server | general | snort_attack } \#                      drop    { client | server | general | snort_attack }#   example:#     preprocessor bo: noalert { general server } drop { snort_attack }# # The Back Orifice detector uses Generator ID 105 and uses the # following SIDS for that GID:#  SID     Event description# -----   -------------------#   1       Back Orifice traffic detected#   2       Back Orifice Client Traffic Detected#   3       Back Orifice Server Traffic Detected#   4       Back Orifice Snort Buffer Attackpreprocessor bo# telnet_decode: Telnet negotiation string normalizer# ---------------------------------------------------# This preprocessor "normalizes" telnet negotiation strings from telnet and ftp# traffic.  It works in much the same way as the http_decode preprocessor,# searching for traffic that breaks up the normal data stream of a protocol and# replacing it with a normalized representation of that traffic so that the# "content" pattern matching keyword can work without requiring modifications.# This preprocessor requires no arguments.## DEPRECATED in favor of ftp_telnet dynamic preprocessor#preprocessor telnet_decode## ftp_telnet: FTP & Telnet normalizer, protocol enforcement and buff overflow# ---------------------------------------------------------------------------# This preprocessor normalizes telnet negotiation strings from telnet and# ftp traffic.  It looks for traffic that breaks the normal data stream# of the protocol, replacing it with a normalized representation of that# traffic so that the "content" pattern matching keyword can work without# requiring modifications.## It also performs protocol correctness checks for the FTP command channel,# and identifies open FTP data transfers.## FTPTelnet has numerous options available, please read# README.ftptelnet for help configuring the options for the global# telnet, ftp server, and ftp client sections for the protocol.###### Per Step #2, set the following to load the ftptelnet preprocessor# dynamicpreprocessor <full path to libsf_ftptelnet_preproc.so># or use commandline option# --dynamic-preprocessor-lib <full path to libsf_ftptelnet_preproc.so>preprocessor ftp_telnet: \    global \    encrypted_traffic yes \    check_encrypted \    inspection_type statefulpreprocessor ftp_telnet_protocol: \    telnet \    ayt_attack_thresh 20 \    normalize ports { 23 } \    detect_anomaliespreprocessor ftp_telnet_protocol: \    ftp server default \    def_max_param_len 100 \    ports { 21 2100 } \    ftp_cmds { USER PASS ACCT CWD SDUP SMNT QUIT REIN PORT PASV TYPE STRU MODE } \    ftp_cmds { RETR STOR STOU APPE ALLO REST RNFR RNTO ABOR DELE RMD MKD PWD } \    ftp_cmds { LIST NLST SITE SYST STAT HELP NOOP } \    ftp_cmds { AUTH ADAT PROT PBSZ CONF ENC } \    ftp_cmds { FEAT OPTS CEL CMD MACB } \    ftp_cmds { MDTM REST SIZE MLST MLSD } \    ftp_cmds { XPWD XCWD XCUP XMKD XRMD TEST CLNT } \    alt_max_param_len 0 { CDUP QUIT REIN PASV STOU ABOR PWD SYST NOOP } \    alt_max_param_len 100 { MDTM CEL XCWD SITE USER PASS REST DELE RMD SYST TEST STAT MACB EPSV CLNT LPRT } \    alt_max_param_len 200 { XMKD NLST ALLO STOU APPE RETR STOR CMD RNFR HELP } \	alt_max_param_len 256 { RNTO CWD } \     alt_max_param_len 400 { PORT } \	alt_max_param_len 512 { SIZE } \    chk_str_fmt { USER PASS ACCT CWD SDUP SMNT PORT TYPE STRU MODE } \    chk_str_fmt { RETR STOR STOU APPE ALLO REST RNFR RNTO DELE RMD MKD } \    chk_str_fmt { LIST NLST SITE SYST STAT HELP } \    chk_str_fmt { AUTH ADAT PROT PBSZ CONF ENC } \    chk_str_fmt { FEAT OPTS CEL CMD } \    chk_str_fmt { MDTM REST SIZE MLST MLSD } \    chk_str_fmt { XPWD XCWD XCUP XMKD XRMD TEST CLNT } \    cmd_validity MODE < char ASBCZ > \    cmd_validity STRU < char FRP > \    cmd_validity ALLO < int [ char R int ] > \    cmd_validity TYPE < { char AE [ char NTC ] | char I | char L [ number ] } > \    cmd_validity MDTM < [ date nnnnnnnnnnnnnn[.n[n[n]]] ] string > \    cmd_validity PORT < host_port >preprocessor ftp_telnet_protocol: \    ftp client default \    max_resp_len 200 \    bounce yes \    telnet_cmds no# smtp: SMTP normalizer, protocol enforcement and buffer overflow# ---------------------------------------------------------------------------# This preprocessor normalizes SMTP commands by removing extraneous spaces.# It looks for overly long command lines, response lines, and data header lines.# It can alert on invalid commands, or specific valid commands.  It can optionally# ignore mail data, and can ignore TLS encrypted data.## SMTP has numerous options available, please read README.SMTP for help# configuring options.###### Per Step #2, set the following to load the smtp preprocessor# dynamicpreprocessor <full path to libsf_smtp_preproc.so># or use commandline option# --dynamic-preprocessor-lib <full path to libsf_smtp_preproc.so>preprocessor SMTP: \    ports { 25 465 691 } \    inspection_type stateful \    normalize cmds \    valid_cmds { MAIL RCPT HELP HELO ETRN EHLO EXPN VRFY ATRN SIZE BDAT DEBUG EMAL ESAM ESND ESOM EVFY IDENT NOOP RSET SEND SAML SOML AUTH TURN ETRN PIPELINING CHUNKING DATA DSN RSET QUIT ONEX QUEU STARTTLS TICK TIME TURNME VERB X-EXPS X-LINK2STATE XADR XAUTH XCIR XEXCH50 XGEN XLICENSE XQUEU XSTA XTRN XUSR } \	normalize_cmds { MAIL RCPT HELP HELO ETRN EHLO EXPN VRFY ATRN SIZE BDAT DEBUG EMAL ESAM ESND ESOM EVFY IDENT NOOP RSET SEND SAML SOML AUTH TURN ETRN PIPELINING CHUNKING DATA DSN RSET QUIT ONEX QUEU STARTTLS TICK TIME TURNME VERB X-EXPS X-LINK2STATE XADR XAUTH XCIR XEXCH50 XGEN XLICENSE XQUEU XSTA XTRN XUSR } \	max_header_line_len 1000 \     max_response_line_len 512 \    alt_max_command_line_len 260 { MAIL } \    alt_max_command_line_len 300 { RCPT } \    alt_max_command_line_len 500 { HELP HELO ETRN EHLO } \    alt_max_command_line_len 255 { EXPN VRFY ATRN SIZE BDAT DEBUG EMAL ESAM ESND ESOM EVFY IDENT NOOP RSET } \    alt_max_command_line_len 246 { SEND SAML SOML AUTH TURN ETRN PIPELINING CHUNKING DATA DSN RSET QUIT ONEX } \    alt_max_command_line_len 246 { QUEU STARTTLS TICK TIME TURNME VERB X-EXPS X-LINK2STATE XADR } \    alt_max_command_line_len 246 { XAUTH XCIR XEXCH50 XGEN XLICENSE XQUEU XSTA XTRN XUSR } \    xlink2state { enable }# sfPortscan# ----------# Portscan detection module.  Detects various types of portscans and# portsweeps.  For more information on detection philosophy, alert types,# and detailed portscan information, please refer to the README.sfportscan.## -configuration options-#     proto { tcp udp icmp ip all }#       The arguments to the proto option are the types of protocol scans that#       the user wants to detect.  Arguments should be separated by spaces and#       not commas.#     scan_type { portscan portsweep decoy_portscan distributed_portscan all }#       The arguments to the scan_type option are the scan types that the#       user wants to detect.  Arguments should be separated by spaces and not#       commas.#     sense_level { low|medium|high }#       There is only one argument to this option and it is the level of#       sensitivity in which to detect portscans.  The 'low' sensitivity#       detects scans by the common method of looking for response errors, such#       as TCP RSTs or ICMP unreachables.  This level requires the least#       tuning.  The 'medium' sensitivity level detects portscans and #       filtered portscans (portscans that receive no response).  This#       sensitivity level usually requires tuning out scan events from NATed#       IPs, DNS cache servers, etc.  The 'high' sensitivity level has#       lower thresholds for portscan detection and a longer time window than#       the 'medium' sensitivity level.  Requires more tuning and may be noisy#       on very active networks.  However, this sensitivity levels catches the#       most scans.#     memcap { positive integer }#       The maximum number of bytes to allocate for portscan detection.  The#       higher this number the more nodes that can be tracked.#     logfile { filename }#       This option specifies the file to log portscan and detailed portscan#       values to.  If there is not a leading /, then snort logs to the#       configured log directory.  Refer to README.sfportscan for details on#       the logged values in the logfile.#     watch_ip { Snort IP List }#     ignore_scanners { Snort IP List }#     ignore_scanned { Snort IP List }#       These options take a snort IP list as the argument.  The 'watch_ip'#       option specifies the IP(s) to watch for portscan.  The #       'ignore_scanners' option specifies the IP(s) to ignore as scanners.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -