Apologies if this should be directed to the snort mailing list instead of here.
I have a rule that is triggering a lot, but I'm aware of why, and want to supress it.
The modified rule is declared in local.rules as below:
alert tcp ![
192.168.4.0/24],$EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"ET EXPLOIT MS-SQL SQL Injection closing string plus line comment"; flow: to_server,established; content:"'|00|"; content:"-|00|-|00|"; reference:url,
owasp.org/index.php/SQL_Injection; reference:url,
doc.emergingthreats.net/bin/view/Main/2000488; classtype:attempted-user; sid:90000001; rev:1;)
The range
192.168.4.0/24 is part of my $HOME_NET range, but I know that this particular rule triggering from here is ok, so I don't want to see alerts any more.
I have tried the NOT argument with and without the square brackets, but it doesn't seem to make any difference.
An example of the trigger from Snorby is:
nsmserver-eth2:7 192.168.4.132 192.168.110.109 ET EXPLOIT MS-SQL SQL Injection closing string plus line comment
Clicking View Rule in snorby does show the modified rule, as above.
I'm seeing this for other rules that I have modified too, so I think there's something I've missed somewhere. Can anyone tell me what I've done wrong please?
Cheers,
Andi