I setup my first Onion security server with Suricata and Emerging threats GPL as signature.
It was a test server but it found many things comprising, very interesting, 5 pcs that where frequently trying to open a connection outside (to japan, german and USA servers)which Onion security (Emerging threats GPL)recognize as "TROJAN MARIPOSA".
Because this server got only small disks (60GB total), yesterday I built a brand new one putting the /nsm on a 400GB partition and, after subriscribing to the free Snort service and retrieving an oinkcode, I chose to use snort "vrt ruleset and emerging threats nogpl ruleset" instead of "Emerging threats GPL".
Everything but the /nsm location and the signature was setup as before (same ip, same CPU, Suricata, ...).
Surprisingly I see almost the same events I saw with the Emerging threats GPL but the MARIPOSA TROJAN events from those machines are disappeared!
Coould it have been a false positive just with emerging threats GPL?
More, Sguil works OK but Snorby catch 0 events now in the main dashboard! (while it seems it's catching something looking at the right column...)
I really didn't understand.
Can you help me?
thanks!
Surprisingly I see almost the same events I saw with the Emerging threats GPL but the MARIPOSA TROJAN events from those machines are disappeared!
Coould it have been a false positive just with emerging threats GPL?
More, Sguil works OK but Snorby catch 0 events now in the main dashboard! (while it seems it's catching something looking at the right column...)
--
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at http://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/groups/opt_out.