Skip to content

Commit

Permalink
Merge pull request #244 from gsanchietti/suricata-categories
Browse files Browse the repository at this point in the history
admin manual: add new suricata rule categories
  • Loading branch information
gsanchietti committed Nov 8, 2017
2 parents 766dc11 + ce56672 commit 226f307
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions administrator-manual/en/suricata.rst
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,10 @@ Current Events
often these will be simple sigs for the Storm binary URL of the day, sigs to catch CLSID's of
newly found vulnerable apps where we don't have any detail on the exploit, etc.

Decoder-events
Suricata specific. These rules log normalization events related to
decoding.

Deleted
Rules removed from the rule set.

Expand All @@ -98,6 +102,9 @@ Exploit
exploits. Generally if you're looking for a windows exploit, Veritas, etc, they'll be here.
Things like SQL injection and the like, whie they are exploits, have their own category.

Files
Example rules for using the file handling and extraction functionality in Suricata.

FTP
Rules for attacks, exploits, and vulnerabilities regarding FTP. Also includes basic
none malicious FTP activity for logging purposes, such as login, etc.
Expand All @@ -107,6 +114,9 @@ Games
World of Warcraft, Starcraft, and other popular online games have sigs here. We don't
intend to label these things evil, just that they're not appropriate for all environments.

HTTP-Events
Rules to log HTTP protocol specific events, typically normal operation.

Info
General rules to track suspicious host network traffic.

Expand Down Expand Up @@ -171,6 +181,9 @@ SMTP
Rules for attacks, exploits, and vulnerabilities regarding SMTP. Also included are
rules detecting basic activity of the protocol for logging purposes.

SMTP-events
Rules that will log SMTP operations.

SNMP
Rules for attacks, exploits, and vulnerabilities regarding SNMP. Also included are
rules detecting basic activity of the protocol for logging purposes.
Expand All @@ -179,6 +192,9 @@ SQL
Rules for attacks, exploits, and vulnerabilities regarding SQL. Also included are rules
detecting basic activity of the protocol for logging purposes.

Stream-events
Rules for matching TCP stream engine events.

TELNET
Rules for attacks and vulnerabilities regarding the TELNET service. Also
included are rules detecting basic activity of the protocol for logging purposes.
Expand All @@ -187,6 +203,8 @@ TFTP
Rules for attacks and vulnerabilities regarding the TFTP service. Also included are
rules detecting basic activity of the protocol for logging purposes.

TLS-Events
Rules for matching on TLS events and anomal

TOR
IP Based rules for the identification of traffic to and from TOR exit nodes.
Expand Down

0 comments on commit 226f307

Please sign in to comment.