False alerts for ET SHELLCODE Common 0a0a0a0a Heap Spray String
6,122 views
Skip to first unread message
Jeff
unread,
Jun 5, 2015, 1:22:27 PM6/5/15
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
I occasionally get alerts for ET SHELLCODE Common 0a0a0a0a Heap Spray String (SID 2012252)
When I download the pcap with CapMe I can't find any content that matches the rule. I sent a pcap to one of the ET guys and he verified that the traffic should not be triggering this alert.
Prior to running Security Onion I was running Snort on my pfSense and I have not yet disabled it. I checked the Snort logs on the pfSense and it does not log an alert for this traffic and rule. (But it otherwise is logging the same alerts as SO).
Any idea why Security Onion would be generating alerts from traffic that doesn't match this rule. I can send a pcap off list if anyone would like to look at it.
Doug Burks
unread,
Jun 9, 2015, 2:47:14 PM6/9/15
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
Hi Jeff,
Security Onion includes a standard Snort engine with a standard
snort.conf, so I can't think of any reason why it would generate false
positives on a simple content match like this.
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
Hi Doug,
Yes, my rule 2012252 matches what is on the ET site. I tried comparing the SO snort.conf and pfSense snort.conf but the pfSense seems to be pretty custom so it's hard to compare.
That said, analyzing the traffic captured I don't see the "0a0a0a0a" anywhere in the capture. I was chatting with one of the ET guys a while back and he looked at a pcap of mine and said it didn't match the rule and didn't alert on his system.
Jeff
On Tuesday, June 9, 2015 at 11:47:14 AM UTC-7, Doug Burks wrote:
> Hi Jeff,
>
> Security Onion includes a standard Snort engine with a standard
> snort.conf, so I can't think of any reason why it would generate false
> positives on a simple content match like this.
>
> Here's SID 2012252 from http://doc.emergingthreats.net/bin/view/Main/2012252:
> alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET
> SHELLCODE Common 0a0a0a0a Heap Spray String";
> flow:established,to_client; content:"0a0a0a0a"; nocase;
> fast_pattern:only;
> reference:url,www.darkreading.com/security/vulnerabilities/221901428/index.html;
> classtype:shellcode-detect; sid:2012252; rev:1;)
>
> Does that match what you get if you run the following command?
> grep 2012252 /etc/nsm/rules/downloaded.rules
>
> Have you compared your snort.conf files to see if there are any
> differences between the one on your pfSense box and your Security
> Onion box?
>
Doug Burks
unread,
Jun 10, 2015, 7:35:01 AM6/10/15
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
How did you pivot to the capture?
How were you analyzing the capture?
Did the capture contain any gzip encoding?
Are you able to provide a sanitized pcap or transcript?
Jeff
unread,
Jun 10, 2015, 11:36:26 AM6/10/15
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
Hi Doug,
Replies inline
On Wednesday, June 10, 2015 at 4:35:01 AM UTC-7, Doug Burks wrote:
> How did you pivot to the capture?
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to securit...@googlegroups.com
If there was gzip encoding involved, then I would presume you won't find the search strings in Wireshark because those strings are gzip encoded in the stream. I believe Snort/Suricata can decode gzipped stream content before searching for string matches. To manually confirm you have a match, you could take your pcap and feed it through a file carver like
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to security-onion
I believe you should be searching the packet for HEX 0a0a0a0a and you will find the string. Shellcode signatures are usually represented as HEX values not ASCII.