I have a false positive on ssh: Gobbles exploit.
The signature id seems to be 1.
+-----+---------------------------------------------------------------------------------------------------------------------------------+--------------+
| cnt | signature | signature_id |
+-----+---------------------------------------------------------------------------------------------------------------------------------+--------------+
| 31978 |
| 68 | ssh: Gobbles exploit | 1 |
Doing grep -i gobbles in rules/downloaded only reveals hashed out lines.
Doing grep -i gobbles in rules/
grep -i gobbles sid-msg.map
1382 || SERVER-OTHER CHAT IRC Ettercap parse overflow attempt || url,
www.bugtraq.org/dev/GOBBLES-12.txt
1810 || SERVER-OTHER successful gobbles ssh exploit GOBBLE || cve,2002-0640 || cve,2002-0390 || bugtraq,5093
1811 || SERVER-OTHER successful gobbles ssh exploit uname || nessus,11031 || cve,2002-0640 || cve,2002-0390 || bugtraq,5093
1812 || SERVER-OTHER gobbles SSH exploit attempt || nessus,11031 || cve,2002-0639 || bugtraq,5093
My intention is to filter out false positives on src ip using threshold.conf.
How do I proceed and how can I have a match when hashed out?
Running SO with Snorby.
Best Regards,
Daniel