1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 | 05/18/2017-08:12:07.219861 [**] [1:2102465:9] GPL NETBIOS SMB-DS IPC$ share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49368 -> 192.168.116.138:445
05/18/2017-08:12:07.740322 [**] [1:2102465:9] GPL NETBIOS SMB-DS IPC$ share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49377 -> 192.168.116.143:445
05/18/2017-08:12:08.412324 [**] [1:2102465:9] GPL NETBIOS SMB-DS IPC$ share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49391 -> 192.168.116.150:445
05/18/2017-08:12:10.218660 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49419 -> 192.168.116.138:445
05/18/2017-08:12:10.761739 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49427 -> 192.168.116.143:445
05/18/2017-08:12:11.419541 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49440 -> 192.168.116.150:445
05/18/2017-08:12:11.552893 [**] [1:2102465:9] GPL NETBIOS SMB-DS IPC$ share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49444 -> 192.168.116.172:445
05/18/2017-08:12:13.280501 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49472 -> 192.168.116.138:445
05/18/2017-08:12:13.810264 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49480 -> 192.168.116.143:445
05/18/2017-08:12:13.890547 [**] [1:2024217:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.149:49480 -> 192.168.116.143:445
05/18/2017-08:12:13.980148 [**] [1:2024217:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.149:49480 -> 192.168.116.143:445
05/18/2017-08:12:14.555289 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49496 -> 192.168.116.172:445
05/18/2017-08:12:17.616959 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49608 -> 192.168.116.172:445
05/18/2017-08:12:19.484251 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.172:445 -> 192.168.116.149:49608
05/18/2017-08:12:20.016462 [**] [1:2001569:15] ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection [**] [Classification: Misc activity] [Priority: 3] {TCP} 192.168.116.149:49667 -> 192.168.116.172:445
05/18/2017-08:12:20.873674 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49690 -> 192.168.116.138:445
05/18/2017-08:12:21.130265 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.172:445 -> 192.168.116.149:49608
05/18/2017-08:12:21.374666 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49700 -> 192.168.116.143:445
05/18/2017-08:12:24.448708 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49767 -> 192.168.116.143:445
05/18/2017-08:12:24.585532 [**] [1:2024217:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.149:49767 -> 192.168.116.143:445
05/18/2017-08:12:25.786015 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:49767
05/18/2017-08:12:26.316396 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:49767
05/18/2017-08:12:27.462730 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:49767
05/18/2017-08:12:27.963824 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:49767
05/18/2017-08:12:31.318842 [**] [1:2024297:2] ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010 [**] [Classification: Attempted Administrator Privilege Gain] [Priority: 1] {TCP} 192.168.116.149:49767 -> 192.168.116.143:445
05/18/2017-08:12:31.350832 [**] [1:2024297:2] ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010 [**] [Classification: Attempted Administrator Privilege Gain] [Priority: 1] {TCP} 192.168.116.149:49767 -> 192.168.116.143:445
05/18/2017-08:12:35.364846 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49988 -> 192.168.116.172:445
05/18/2017-08:12:35.364850 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:49989 -> 192.168.116.143:445
05/18/2017-08:12:38.429065 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50069 -> 192.168.116.143:445
05/18/2017-08:12:38.439618 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50069 -> 192.168.116.143:445
05/18/2017-08:12:40.293141 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:50069
05/18/2017-08:12:41.965190 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:50069
05/18/2017-08:12:42.119672 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50164 -> 192.168.116.138:445
05/18/2017-08:12:42.150152 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.143:445 -> 192.168.116.149:50069
05/18/2017-08:12:45.180396 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50240 -> 192.168.116.138:445
05/18/2017-08:12:47.047976 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50240
05/18/2017-08:12:48.703788 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50240
05/18/2017-08:12:52.341470 [**] [1:2024297:2] ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010 [**] [Classification: Attempted Administrator Privilege Gain] [Priority: 1] {TCP} 192.168.116.149:50240 -> 192.168.116.138:445
05/18/2017-08:12:55.350736 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50522 -> 192.168.116.143:445
05/18/2017-08:12:58.411383 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50610 -> 192.168.116.143:445
05/18/2017-08:12:59.373043 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50642 -> 192.168.116.172:445
05/18/2017-08:13:01.962414 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50725 -> 192.168.116.138:445
05/18/2017-08:13:01.963256 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50725
05/18/2017-08:13:02.455562 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50742 -> 192.168.116.172:445
05/18/2017-08:13:04.302431 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50799 -> 192.168.116.143:445
05/18/2017-08:13:04.394538 [**] [1:2024218:2] ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.172:445 -> 192.168.116.149:50742
05/18/2017-08:13:04.972919 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50837 -> 192.168.116.138:445
05/18/2017-08:13:04.973179 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50837
05/18/2017-08:13:04.973952 [**] [1:2102466:9] GPL NETBIOS SMB-DS IPC$ unicode share access [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 192.168.116.149:50838 -> 192.168.116.138:445
05/18/2017-08:13:04.974146 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.984819 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.985001 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.985263 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.985502 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.985595 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.985775 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:04.986049 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011586 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011600 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011613 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011739 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011783 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011794 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011846 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011894 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011908 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.011950 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012005 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012017 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012044 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012054 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012064 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012078 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012088 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012099 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012114 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 192.168.116.138:445 -> 192.168.116.149:50838
05/18/2017-08:13:05.012132 [**] [1:2024216:1] ET EXPLOIT Possible DOUBLEPULSAR Beacon Response [**] [Classifi
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 | lastcmd:ulimit -c unlimited; /opt/suricata400/bin/suricata -c /opt/suricata400/etc/etopen/suricata400-etopen-all.yaml -l /var/www/html/59994f08e9dd9739c3a9b529ecf997d2d2a6d3ad9c956d904083161fa55f2f7a -r /var/pcap/08112019.0024-2017-05-18-WannaCry-ransomware-using-EnternalBlue-exploit.pcap -vvv -k none
elapsedtime:15.523039
stderr:
stdout:
9/12/2019 -- 07:28:18 - <Info> - Configuration node 'rule-files' redefined.
9/12/2019 -- 07:28:18 - <Notice> - This is Suricata version 4.0.0 RELEASE
9/12/2019 -- 07:28:18 - <Info> - CPUs/cores online: 1
9/12/2019 -- 07:28:18 - <Config> - 'default' server has 'request-body-minimal-inspect-size' set to 31503 and 'request-body-inspect-window' set to 16641 after randomization.
9/12/2019 -- 07:28:18 - <Config> - 'default' server has 'response-body-minimal-inspect-size' set to 33977 and 'response-body-inspect-window' set to 15817 after randomization.
9/12/2019 -- 07:28:18 - <Config> - DNS request flood protection level: 500
9/12/2019 -- 07:28:18 - <Config> - DNS per flow memcap (state-memcap): 524288
9/12/2019 -- 07:28:18 - <Config> - DNS global memcap: 16777216
9/12/2019 -- 07:28:18 - <Config> - allocated 262144 bytes of memory for the host hash... 4096 buckets of size 64
9/12/2019 -- 07:28:18 - <Config> - preallocated 1000 hosts of size 136
9/12/2019 -- 07:28:18 - <Config> - host memory usage: 398144 bytes, maximum: 16777216
9/12/2019 -- 07:28:18 - <Config> - using magic-file /usr/share/file/magic
9/12/2019 -- 07:28:18 - <Config> - Core dump size is unlimited.
9/12/2019 -- 07:28:18 - <Config> - allocated 3670016 bytes of memory for the defrag hash... 65536 buckets of size 56
9/12/2019 -- 07:28:18 - <Config> - preallocated 1000 defrag trackers of size 168
9/12/2019 -- 07:28:18 - <Config> - defrag memory usage: 3838016 bytes, maximum: 33554432
9/12/2019 -- 07:28:18 - <Config> - stream "prealloc-sessions": 2048 (per thread)
9/12/2019 -- 07:28:18 - <Config> - stream "memcap": 33554432
9/12/2019 -- 07:28:18 - <Config> - stream "midstream" session pickups: disabled
9/12/2019 -- 07:28:18 - <Config> - stream "async-oneside": disabled
9/12/2019 -- 07:28:18 - <Config> - stream "checksum-validation": disabled
9/12/2019 -- 07:28:18 - <Config> - stream."inline": disabled
9/12/2019 -- 07:28:18 - <Config> - stream "bypass": disabled
9/12/2019 -- 07:28:18 - <Config> - stream "max-synack-queued": 5
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly "memcap": 134217728
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly "depth": 0
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly "toserver-chunk-size": 2500
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly "toclient-chunk-size": 2625
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly.raw: enabled
9/12/2019 -- 07:28:18 - <Config> - stream.reassembly "segment-prealloc": 2048
9/12/2019 -- 07:28:18 - <Config> - Delayed detect disabled
9/12/2019 -- 07:28:18 - <Config> - pattern matchers: MPM: ac, SPM: bm
9/12/2019 -- 07:28:18 - <Config> - grouping: tcp-whitelist (default) 53, 80, 139, 443, 445, 1433, 3306, 3389, 6666, 6667, 8080
9/12/2019 -- 07:28:18 - <Config> - grouping: udp-whitelist (default) 53, 135, 5060
9/12/2019 -- 07:28:18 - <Config> - prefilter engines: MPM
9/12/2019 -- 07:28:18 - <Config> - IP reputation disabled
9/12/2019 -- 07:28:18 - <Perf> - Registered 148 keyword profiling counters.
9/12/2019 -- 07:28:18 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-ftp.rules
9/12/2019 -- 07:28:18 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-policy.rules
9/12/2019 -- 07:28:18 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-trojan.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-games.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-pop3.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-user_agents.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-activex.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-rpc.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-attack_response.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-icmp.rules
9/12/2019 -- 07:28:20 - <Config> - No rules loaded from ET-emerging-icmp.rules.
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-scan.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-voip.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-chat.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-icmp_info.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-info.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-shellcode.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-web_client.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-imap.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-web_server.rules
9/12/2019 -- 07:28:20 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-current_events.rules
9/12/2019 -- 07:28:21 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-inappropriate.rules
9/12/2019 -- 07:28:21 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-smtp.rules
9/12/2019 -- 07:28:21 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-web_specific_apps.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-deleted.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-malware.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-snmp.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-worm.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-dns.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-misc.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-sql.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-dos.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-netbios.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-telnet.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-exploit.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-p2p.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-tftp.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-emerging-mobile_malware.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-botcc.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-compromised.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-drop.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-dshield.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-tor.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/ET-ciarmy.rules
9/12/2019 -- 07:28:23 - <Config> - Loading rule file: /opt/suricata400/etc/etopen/local.rules
9/12/2019 -- 07:28:23 - <Config> - No rules loaded from local.rules.
9/12/2019 -- 07:28:23 - <Info> - 44 rule files processed. 18236 rules successfully loaded, 0 rules failed
9/12/2019 -- 07:28:23 - <Info> - Threshold config parsed: 0 rule(s) found
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tcp-packet
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tcp-stream
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for udp-packet
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for other-ip
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_uri
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_request_line
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_client_body
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_response_line
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_header
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_header
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_header_names
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_header_names
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_accept
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_accept_enc
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_accept_lang
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_referer
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_connection
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_content_len
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_content_len
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_content_type
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_content_type
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_protocol
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_protocol
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_start
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_start
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_raw_header
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_raw_header
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_method
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_cookie
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_cookie
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_raw_uri
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_user_agent
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_host
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_raw_host
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_stat_msg
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_stat_code
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for dns_query
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tls_sni
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tls_cert_issuer
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tls_cert_subject
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for tls_cert_serial
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for dce_stub_data
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for dce_stub_data
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for ssh_protocol
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for ssh_protocol
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for ssh_software
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for ssh_software
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for file_data
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for file_data
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_request_line
9/12/2019 -- 07:28:23 - <Perf> - using shared mpm ctx' for http_response_line
9/12/2019 -- 07:28:23 - <Info> - 18241 signatures processed. 1175 are IP-only rules, 6125 are inspecting packet payload, 13172 inspect application layer, 0 are decoder event only
9/12/2019 -- 07:28:23 - <Config> - building signature grouping structure, stage 1: preprocessing rules... complete
9/12/2019 -- 07:28:23 - <Perf> - TCP toserver: 41 port groups, 40 unique SGH's, 1 copies
9/12/2019 -- 07:28:23 - <Perf> - TCP toclient: 21 port groups, 21 unique SGH's, 0 copies
9/12/2019 -- 07:28:23 - <Perf> - UDP toserver: 41 port groups, 33 unique SGH's, 8 copies
9/12/2019 -- 07:28:23 - <Perf> - UDP toclient: 21 port groups, 15 unique SGH's, 6 copies
9/12/2019 -- 07:28:23 - <Perf> - OTHER toserver: 254 proto groups, 2 unique SGH's, 252 copies
9/12/2019 -- 07:28:23 - <Perf> - OTHER toclient: 254 proto groups, 0 unique SGH's, 254 copies
9/12/2019 -- 07:28:24 - <Perf> - Unique rule groups: 111
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toserver TCP packet": 31
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toclient TCP packet": 20
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toserver TCP stream": 31
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toclient TCP stream": 21
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toserver UDP packet": 33
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "toclient UDP packet": 15
9/12/2019 -- 07:28:24 - <Perf> - Builtin MPM "other IP packet": 2
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_uri": 8
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_request_line": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_client_body": 6
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_response_line": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_header": 6
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_header": 3
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_header_names": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_accept": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_referer": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_content_len": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_content_type": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_content_type": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_start": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_raw_header": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_raw_header": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_method": 3
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_cookie": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_cookie": 2
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_raw_uri": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_user_agent": 4
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver http_host": 2
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient http_stat_code": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver dns_query": 4
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver tls_sni": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient tls_cert_issuer": 2
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient tls_cert_subject": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient tls_cert_serial": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver ssh_protocol": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toserver file_data": 1
9/12/2019 -- 07:28:24 - <Perf> - AppLayer MPM "toclient file_data": 5
9/12/2019 -- 07:28:25 - <Perf> - Registered 18241 rule profiling counters.
9/12/2019 -- 07:28:25 - <Info> - fast output device (regular) initialized: alert
9/12/2019 -- 07:28:25 - <Info> - eve-log output device (regular) initialized: eve.json
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'alert'
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'http'
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'dns'
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'tls'
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'files'
9/12/2019 -- 07:28:25 - <Config> - enabling 'eve-log' module 'ssh'
9/12/2019 -- 07:28:25 - <Info> - Unified2-alert initialized: filename unified2.alert,
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Packet profile dump:
IP ver Proto cnt min max avg tot %%
------ ----- ---------- ------------ ------------ ----------- ----------- ---
IPv4 1 2 65123484 165336624 115230054 230.5m 0.00
IPv4 2 11 756638930 8411724862 4239888826 46.6b 0.02
IPv4 6 43596 7572892 8748123542 5854186819 255219.1b 99.45
IPv4 17 354 2158344 8456983056 1317702100 466.5b 0.18
IPv6 6 340 13454986 8428691130 732629880 249.1b 0.10
IPv6 17 91 12432536 8456768216 2147780109 195.4b 0.08
IPv6 58 92 26909306 8431134840 5020777662 461.9b 0.18
Note: Protocol 256 tracks pseudo/tunnel packets.
Per Thread module stats:
Thread Module IP ver Proto cnt min max avg tot %%
------------------------ ------ ----- ---------- ------------ ------------ ----------- ----------- ---
TMM_FLOWWORKER IPv4 1 2 177842 223332 200587 401.2k 0.00
TMM_FLOWWORKER IPv4 2 11 113356 130794 121128 1.3m 0.01
TMM_FLOWWORKER IPv4 6 43596 113452 17774922 367456 16.0b 93.83
TMM_FLOWWORKER IPv4 17 354 213526 21006656 608758 215.5m 1.26
TMM_RECEIVEPCAPFILE IPv4 1 2 4740 4774 4757 9.5k 0.00
TMM_RECEIVEPCAPFILE IPv4 2 11 4450 5834 4613 50.7k 0.00
TMM_RECEIVEPCAPFILE IPv4 6 43295 4420 149216 4846 209.8m 1.23
TMM_RECEIVEPCAPFILE IPv4 17 354 4432 28964 5000 1.8m 0.01
TMM_DECODEPCAPFILE IPv4 1 2 5146 6804 5975 11.9k 0.00
TMM_DECODEPCAPFILE IPv4 2 11 4570 7956 5124 56.4k 0.00
TMM_DECODEPCAPFILE IPv4 6 43295 4542 14981174 9473 410.2m 2.40
TMM_DECODEPCAPFILE IPv4 17 354 4566 52682 5207 1.8m 0.01
TMM_FLOWWORKER IPv6 6 340 114908 15868464 404412 137.5m 0.81
TMM_FLOWWORKER IPv6 17 91 177534 7587596 398913 36.3m 0.21
TMM_FLOWWORKER IPv6 58 92 113488 197526 133922 12.3m 0.07
TMM_RECEIVEPCAPFILE IPv6 6 330 4436 20228 4894 1.6m 0.01
TMM_RECEIVEPCAPFILE IPv6 17 91 4440 29378 5131 467.0k 0.00
TMM_RECEIVEPCAPFILE IPv6 58 92 4430 6780 4652 428.0k 0.00
TMM_DECODEPCAPFILE IPv6 6 330 4560 5351648 21269 7.0m 0.04
TMM_DECODEPCAPFILE IPv6 17 91 4588 28896 5581 508.0k 0.00
TMM_DECODEPCAPFILE IPv6 58 92 4572 15321214 171997 15.8m 0.09
Flow Worker IP ver Proto cnt min max avg
-------------------- ------ ----- ---------- ------------ ------------ -----------
flow IPv4 1 2 5766 6718 6242 12.5k 0.00
flow IPv4 6 43295 4550 7276736 5457 236.3m 1.64
flow IPv4 17 354 4744 50048 6084 2.2m 0.01
stream IPv4 6 43596 4594 2344490 11414 497.6m 3.44
app-layer IPv4 17 354 4424 15150086 50043 17.7m 0.12
detect IPv4 1 2 156348 199924 178136 356.3k 0.00
detect IPv4 2 11 104056 121428 111658 1.2m 0.01
detect IPv4 6 43596 76218 17709456 299780 13.1b 90.44
detect IPv4 17 354 185544 20954244 532780 188.6m 1.31
tcp-prune IPv4 6 43596 4428 16535282 6038 263.2m 1.82
flow IPv6 6 330 4738 72200 5589 1.8m 0.01
flow IPv6 17 91 4742 27066 6436 585.7k 0.00
flow IPv6 58 92 4740 14912 6003 552.3k 0.00
stream IPv6 6 340 4456 156126 14043 4.8m 0.03
app-layer IPv6 17 91 4432 35108 10389 945.4k 0.01
detect IPv6 6 340 77046 15823028 356116 121.1m 0.84
detect IPv6 17 91 149778 7537490 362458 33.0m 0.23
detect IPv6 58 92 95018 176330 112306 10.3m 0.07
tcp-prune IPv6 6 340 4406 36674 5115 1.7m 0.01
Note: stream includes app-layer for TCP
Per App layer parser stats:
App Layer IP ver Proto cnt min max avg
-------------------- ------ ----- ---------- ------------ ------------ -----------
smb IPv4 6 212 4528 26992 5145 1.1m 51.90
smb IPv4 17 26 4596 7642 5284 137.4k 6.54
smb2 IPv4 6 121 4420 5312 4514 546.2k 25.99
smb2 IPv4 17 25 4426 4952 4513 112.8k 5.37
smb IPv6 6 6 4554 9820 5691 34.1k 1.62
smb IPv6 17 22 4596 9176 5417 119.2k 5.67
smb2 IPv6 6 4 4474 5992 5093 20.4k 0.97
smb2 IPv6 17 9 4436 4952 4527 40.7k 1.94
Proto detect IPv4 6 228 4504 20838 5034 1.1m
Proto detect IPv4 17 76 4570 69750 7043 535.3k
Proto detect IPv6 17 44 4576 24910 6651 292.7k
Log Thread Module IP ver Proto cnt min max avg tot %%
------------------------ ------ ----- ---------- ------------ ------------ ----------- ----------- ---
Logger/output stats:
Logger IP ver Proto cnt min max avg tot
------------------------ ------ ----- ---------- ------------ ------------ ----------- -----------
LOGGER_ALERT_FAST IPv4 6 7860 12022 13180234 22758 178.9m 24.25
LOGGER_UNIFIED2 IPv4 6 7860 19330 5044604 24654 193.8m 26.28
LOGGER_JSON_ALERT IPv4 6 7860 32738 3034098 46416 364.8m 49.47
Prefilter IP ver Proto cnt min max avg tot %%
-------------------- ------ ----- ---------- ------------ ------------ ----------- --------- ---
payload IPv4 1 2 16192 51066 33629 67.3k 0.00
payload IPv4 6 33529 4420 9803128 21496 720.8m 48.81
payload IPv4 17 354 4976 296950 20877 7.4m 0.50
stream IPv4 6 33529 4398 7728972 20793 697.2m 47.21
Total IPv4 67414 21144 1.4b
payload IPv6 6 282 4446 15556226 150251 42.4m 2.87
payload IPv6 17 91 5042 70822 15103 1.4m 0.09
payload IPv6 58 92 4700 25562 6288 578.5k 0.04
stream IPv6 6 282 4424 980208 24773 7.0m 0.47
Total IPv6 747 68687 51.3m
General detection engine stats:
Detection phase IP ver Proto cnt min max avg tot
------------------------ ------ ----- ---------- ------------ ------------ ----------- -----------
PROF_DETECT_IPONLY IPv4 1 2 24098 27342 25720 51.4k 0.00
PROF_DETECT_IPONLY IPv4 2 11 22188 38686 27346 300.8k 0.00
PROF_DETECT_IPONLY IPv4 6 641 21754 106988 25888 16.6m 0.12
PROF_DETECT_IPONLY IPv4 17 82 22130 6733388 119794 9.8m 0.07
PROF_DETECT_RULES IPv4 1 2 15184 20144 17664 35.3k 0.00
PROF_DETECT_RULES IPv4 2 11 4422 4484 4442 48.9k 0.00
PROF_DETECT_RULES IPv4 6 43596 4408 17437658 145088 6.3b 44.84
PROF_DETECT_RULES IPv4 17 354 73130 20667924 367892 130.2m 0.92
PROF_DETECT_STATEFUL_CONT IPv4 1 2 4406 6256 5331 10.7k 0.00
PROF_DETECT_STATEFUL_CONT IPv4 2 11 4434 4728 4623 50.9k 0.00
PROF_DETECT_STATEFUL_CONT IPv4 6 43596 4392 13159664 6772 295.2m 2.09
PROF_DETECT_STATEFUL_CONT IPv4 17 354 4394 7756 4793 1.7m 0.01
PROF_DETECT_STATEFUL_UPDATE IPv4 6 40710 4434 428056 4774 194.4m 1.38
PROF_DETECT_PREFILTER IPv4 1 2 44112 85598 64855 129.7k 0.00
PROF_DETECT_PREFILTER IPv4 2 11 13526 15086 14080 154.9k 0.00
PROF_DETECT_PREFILTER IPv4 6 43596 13318 9980040 79305 3.5b 24.51
PROF_DETECT_PREFILTER IPv4 17 354 41052 358580 60163 21.3m 0.15
PROF_DETECT_PF_PAYLOAD IPv4 1 2 25382 60104 42743 85.5k 0.00
PROF_DETECT_PF_PAYLOAD IPv4 6 33529 22722 9933640 57785 1.9b 13.74
PROF_DETECT_PF_PAYLOAD IPv4 17 354 13882 305898 30098 10.7m 0.08
PROF_DETECT_PF_TX IPv4 6 40710 4522 3397344 5139 209.2m 1.48
PROF_DETECT_PF_SORT1 IPv4 6 28512 4410 433564 5867 167.3m 1.19
PROF_DETECT_PF_SORT1 IPv4 17 354 4490 37278 5816 2.1m 0.01
PROF_DETECT_PF_SORT2 IPv4 1 2 4858 11694 8276 16.6k 0.00
PROF_DETECT_PF_SORT2 IPv4 2 11 4406 5094 4608 50.7k 0.00
PROF_DETECT_PF_SORT2 IPv4 6 43596 4396 281186 4851 211.5m 1.50
PROF_DETECT_PF_SORT2 IPv4 17 354 4440 33812 5036 1.8m 0.01
PROF_DETECT_NONMPMLIST IPv4 1 2 4724 7614 6169 12.3k 0.00
PROF_DETECT_NONMPMLIST IPv4 2 11 4626 4726 4676 51.4k 0.00
PROF_DETECT_NONMPMLIST IPv4 6 43596 4404 2465480 5075 221.3m 1.57
PROF_DETECT_NONMPMLIST IPv4 17 354 4416 15086 4901 1.7m 0.01
PROF_DETECT_ALERT IPv4 1 2 4470 4474 4472 8.9k 0.00
PROF_DETECT_ALERT IPv4 2 11 4410 4808 4507 49.6k 0.00
PROF_DETECT_ALERT IPv4 6 43596 4400 7081592 5067 220.9m 1.57
PROF_DETECT_ALERT IPv4 17 354 4412 26488 4825 1.7m 0.01
PROF_DETECT_CLEANUP IPv4 1 2 4810 4992 4901 9.8k 0.00
PROF_DETECT_CLEANUP IPv4 2 11 4408 19882 5874 64.6k 0.00
PROF_DETECT_CLEANUP IPv4 6 43596 4436 16682980 5287 230.5m 1.63
PROF_DETECT_CLEANUP IPv4 17 354 4402 18206 4848 1.7m 0.01
PROF_DETECT_GETSGH IPv4 1 2 5282 5976 5629 11.3k 0.00
PROF_DETECT_GETSGH IPv4 2 11 4634 6706 4879 53.7k 0.00
PROF_DETECT_GETSGH IPv4 6 43596 4400 1561080 5136 223.9m 1.59
PROF_DETECT_GETSGH IPv4 17 354 4416 175454 7832 2.8m 0.02
PROF_DETECT_IPONLY IPv6 6 20 4710 6488 5031 100.6k 0.00
PROF_DETECT_IPONLY IPv6 17 44 4754 33746 7868 346.2k 0.00
PROF_DETECT_IPONLY IPv6 58 45 4706 24956 6684 300.8k 0.00
PROF_DETECT_RULES IPv6 6 340 4412 6495838 97019 33.0m 0.23
PROF_DETECT_RULES IPv6 17 91 49538 248114 132627 12.1m 0.09
PROF_DETECT_RULES
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 | ------------------------------------------------------------------------------------
Date: 12/9/2019 -- 07:28:33 (uptime: 0d, 00h 00m 08s)
------------------------------------------------------------------------------------
Counter | TM Name | Value
------------------------------------------------------------------------------------
decoder.pkts | Total | 46654
decoder.bytes | Total | 37044839
decoder.ipv4 | Total | 43662
decoder.ipv6 | Total | 513
decoder.ethernet | Total | 46654
decoder.tcp | Total | 43625
decoder.udp | Total | 445
decoder.icmpv4 | Total | 2
decoder.icmpv6 | Total | 92
decoder.avg_pkt_size | Total | 794
decoder.max_pkt_size | Total | 1514
flow.tcp | Total | 331
flow.udp | Total | 102
flow.icmpv6 | Total | 37
tcp.sessions | Total | 327
tcp.syn | Total | 327
tcp.synack | Total | 325
tcp.rst | Total | 301
tcp.overlap | Total | 2
detect.alert | Total | 5990
detect.mpm_list | Total | 9
detect.nonmpm_list | Total | 2
detect.match_list | Total | 6
app_layer.flow.smb | Total | 93
app_layer.flow.failed_tcp | Total | 1
app_layer.flow.failed_udp | Total | 102
flow_mgr.closed_pruned | Total | 5
flow_mgr.new_pruned | Total | 128
flow_mgr.est_pruned | Total | 1
flow.spare | Total | 10000
flow_mgr.flows_checked | Total | 75
flow_mgr.flows_notimeout | Total | 67
flow_mgr.flows_timeout | Total | 8
flow_mgr.flows_removed | Total | 8
flow_mgr.rows_checked | Total | 65536
flow_mgr.rows_skipped | Total | 65462
flow_mgr.rows_maxlen | Total | 2
tcp.memuse | Total | 573440
tcp.reassembly_memuse | Total | 1652736
flow.memuse | Total | 7171648
------------------------------------------------------------------------------------
Date: 12/9/2019 -- 07:28:34 (uptime: 0d, 00h 00m 09s)
------------------------------------------------------------------------------------
Counter | TM Name | Value
------------------------------------------------------------------------------------
decoder.pkts | Total | 46654
decoder.bytes | Total | 37044839
decoder.ipv4 | Total | 43662
decoder.ipv6 | Total | 513
decoder.ethernet | Total | 46654
decoder.tcp | Total | 43625
decoder.udp | Total | 445
decoder.icmpv4 | Total | 2
decoder.icmpv6 | Total | 92
decoder.avg_pkt_size | Total | 794
decoder.max_pkt_size | Total | 1514
flow.tcp | Total | 332
flow.udp | Total | 120
flow.icmpv6 | Total | 45
tcp.sessions | Total | 328
tcp.syn | Total | 328
tcp.synack | Total | 325
tcp.rst | Total | 323
tcp.overlap | Total | 2
detect.alert | Total | 7860
detect.mpm_list | Total | 9
detect.nonmpm_list | Total | 2
detect.match_list | Total | 6
app_layer.flow.smb | Total | 93
app_layer.flow.failed_tcp | Total | 1
app_layer.flow.failed_udp | Total | 120
flow_mgr.closed_pruned | Total | 5
flow_mgr.new_pruned | Total | 128
flow_mgr.est_pruned | Total | 1
flow.spare | Total | 10000
flow_mgr.flows_checked | Total | 75
flow_mgr.flows_notimeout | Total | 67
flow_mgr.flows_timeout | Total | 8
flow_mgr.flows_removed | Total | 8
flow_mgr.rows_checked | Total | 65536
flow_mgr.rows_skipped | Total | 65462
flow_mgr.rows_maxlen | Total | 2
tcp.memuse | Total | 573440
tcp.reassembly_memuse | Total | 81920
flow.memuse | Total | 7171648
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 | {"timestamp":"2017-05-18T08:12:07.219861+0000","flow_id":1568667403235895,"pcap_cnt":1123,"event_type":"alert","src_ip":"192.168.116.149","src_port":49368,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102465,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:07.740322+0000","flow_id":1742927111341281,"pcap_cnt":1159,"event_type":"alert","src_ip":"192.168.116.149","src_port":49377,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102465,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:08.412324+0000","flow_id":1537163818187790,"pcap_cnt":1197,"event_type":"alert","src_ip":"192.168.116.149","src_port":49391,"dest_ip":"192.168.116.150","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102465,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:10.218660+0000","flow_id":2088083568349595,"pcap_cnt":1249,"event_type":"alert","src_ip":"192.168.116.149","src_port":49419,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:10.761739+0000","flow_id":1412944774199625,"pcap_cnt":1274,"event_type":"alert","src_ip":"192.168.116.149","src_port":49427,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:11.419541+0000","flow_id":1641164303983674,"pcap_cnt":1308,"event_type":"alert","src_ip":"192.168.116.149","src_port":49440,"dest_ip":"192.168.116.150","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:11.552893+0000","flow_id":1513573710516099,"pcap_cnt":1334,"event_type":"alert","src_ip":"192.168.116.149","src_port":49444,"dest_ip":"192.168.116.172","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102465,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:13.280501+0000","flow_id":197844839268854,"pcap_cnt":1385,"event_type":"alert","src_ip":"192.168.116.149","src_port":49472,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:13.810264+0000","flow_id":1865587082761628,"pcap_cnt":1467,"event_type":"alert","src_ip":"192.168.116.149","src_port":49480,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:13.890547+0000","flow_id":1865587082761628,"pcap_cnt":1484,"event_type":"alert","src_ip":"192.168.116.149","src_port":49480,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024217,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:13.980148+0000","flow_id":1865587082761628,"pcap_cnt":1530,"event_type":"alert","src_ip":"192.168.116.149","src_port":49480,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024217,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:14.555289+0000","flow_id":735941964494132,"pcap_cnt":1565,"event_type":"alert","src_ip":"192.168.116.149","src_port":49496,"dest_ip":"192.168.116.172","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:17.616959+0000","flow_id":780813635526366,"pcap_cnt":1872,"event_type":"alert","src_ip":"192.168.116.149","src_port":49608,"dest_ip":"192.168.116.172","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:19.484251+0000","flow_id":780813635526366,"pcap_cnt":1971,"event_type":"alert","src_ip":"192.168.116.172","src_port":445,"dest_ip":"192.168.116.149","dest_port":49608,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:20.016462+0000","flow_id":917960531394638,"pcap_cnt":2048,"event_type":"alert","src_ip":"192.168.116.149","src_port":49667,"dest_ip":"192.168.116.172","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2001569,"rev":15,"signature":"ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection","category":"Misc activity","severity":3}}
{"timestamp":"2017-05-18T08:12:20.873674+0000","flow_id":1122536266158340,"pcap_cnt":2122,"event_type":"alert","src_ip":"192.168.116.149","src_port":49690,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:21.130265+0000","flow_id":780813635526366,"pcap_cnt":2136,"event_type":"alert","src_ip":"192.168.116.172","src_port":445,"dest_ip":"192.168.116.149","dest_port":49608,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:21.374666+0000","flow_id":1273293913305687,"pcap_cnt":2226,"event_type":"alert","src_ip":"192.168.116.149","src_port":49700,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:24.448708+0000","flow_id":930413789319774,"pcap_cnt":2339,"event_type":"alert","src_ip":"192.168.116.149","src_port":49767,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:24.585532+0000","flow_id":930413789319774,"pcap_cnt":2391,"event_type":"alert","src_ip":"192.168.116.149","src_port":49767,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024217,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:25.786015+0000","flow_id":930413789319774,"pcap_cnt":2440,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":49767,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:26.316396+0000","flow_id":930413789319774,"pcap_cnt":2508,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":49767,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:27.462730+0000","flow_id":930413789319774,"pcap_cnt":2678,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":49767,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:27.963824+0000","flow_id":930413789319774,"pcap_cnt":2685,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":49767,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:31.318842+0000","flow_id":930413789319774,"pcap_cnt":2838,"event_type":"alert","src_ip":"192.168.116.149","src_port":49767,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024297,"rev":2,"signature":"ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010","category":"Attempted Administrator Privilege Gain","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:31.350832+0000","flow_id":930413789319774,"pcap_cnt":2854,"event_type":"alert","src_ip":"192.168.116.149","src_port":49767,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024297,"rev":2,"signature":"ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010","category":"Attempted Administrator Privilege Gain","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:35.364846+0000","flow_id":1134078991764621,"pcap_cnt":2870,"event_type":"alert","src_ip":"192.168.116.149","src_port":49988,"dest_ip":"192.168.116.172","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:35.364850+0000","flow_id":381212026965360,"pcap_cnt":2871,"event_type":"alert","src_ip":"192.168.116.149","src_port":49989,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:38.429065+0000","flow_id":370208320966148,"pcap_cnt":2898,"event_type":"alert","src_ip":"192.168.116.149","src_port":50069,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:38.439618+0000","flow_id":370208320966148,"pcap_cnt":2900,"event_type":"alert","src_ip":"192.168.116.149","src_port":50069,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:40.293141+0000","flow_id":370208320966148,"pcap_cnt":2976,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":50069,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:41.965190+0000","flow_id":370208320966148,"pcap_cnt":3164,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":50069,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:42.119672+0000","flow_id":922090143927830,"pcap_cnt":3178,"event_type":"alert","src_ip":"192.168.116.149","src_port":50164,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:42.150152+0000","flow_id":370208320966148,"pcap_cnt":3186,"event_type":"alert","src_ip":"192.168.116.143","src_port":445,"dest_ip":"192.168.116.149","dest_port":50069,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:45.180396+0000","flow_id":2113013708355878,"pcap_cnt":3396,"event_type":"alert","src_ip":"192.168.116.149","src_port":50240,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:47.047976+0000","flow_id":2113013708355878,"pcap_cnt":3465,"event_type":"alert","src_ip":"192.168.116.138","src_port":445,"dest_ip":"192.168.116.149","dest_port":50240,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:48.703788+0000","flow_id":2113013708355878,"pcap_cnt":3579,"event_type":"alert","src_ip":"192.168.116.138","src_port":445,"dest_ip":"192.168.116.149","dest_port":50240,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024218,"rev":2,"signature":"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response","category":"A Network Trojan was detected","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:52.341470+0000","flow_id":2113013708355878,"pcap_cnt":3755,"event_type":"alert","src_ip":"192.168.116.149","src_port":50240,"dest_ip":"192.168.116.138","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2024297,"rev":2,"signature":"ET EXPLOIT ETERNALBLUE Exploit M2 MS17-010","category":"Attempted Administrator Privilege Gain","severity":1},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:55.350736+0000","flow_id":1717432188620893,"pcap_cnt":3768,"event_type":"alert","src_ip":"192.168.116.149","src_port":50522,"dest_ip":"192.168.116.143","dest_port":445,"proto":"TCP","alert":{"action":"allowed","gid":1,"signature_id":2102466,"rev":9,"signature":"GPL NETBIOS SMB-DS IPC$ unicode share access","category":"Generic Protocol Command Decode","severity":3},"app_proto":"smb"}
{"timestamp":"2017-05-18T08:12:58.411383+0000","flow_id":1799474
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 | --------------------------------------------------------------------------------------------------------------------------------
Date: 12/9/2019 -- 07:28:34
--------------------------------------------------------------------------------------------------------------------------------
Stats for: total
--------------------------------------------------------------------------------------------------------------------------------
Keyword Ticks Checks Matches Max Ticks Avg Avg Match Avg No Match
---------------- --------------- --------------- --------------- --------------- --------------- --------------- ---------------
flags 1562152 321 321 18290 4866.00 4866.00 0.00
flow 40986516 8329 8329 75464 4920.00 4920.00 0.00
threshold 2182978 365 4 26550 5980.00 5165.00 5989.00
content 1408048652 219869 140597 12311544 6404.00 7129.00 5116.00
pcre 90196860 13074 7932 13170092 6898.00 5737.00 8690.00
byte_test 11903334 2282 645 38030 5216.00 5020.00 5293.00
byte_jump 145419620 28748 142 3387470 5058.00 5073.00 5058.00
flowbits 1126614 170 170 45350 6627.00 6627.00 0.00
byte_extract 4391106 794 794 22934 5530.00 5530.00 0.00
asn1 707096 24 0 70826 29462.00 0.00 29462.00
--------------------------------------------------------------------------------------------------------------------------------
Stats for: packet
--------------------------------------------------------------------------------------------------------------------------------
Keyword Ticks Checks Matches Max Ticks Avg Avg Match Avg No Match
---------------- --------------- --------------- --------------- --------------- --------------- --------------- ---------------
flags 1562152 321 321 18290 4866.00 4866.00 0.00
flow 40986516 8329 8329 75464 4920.00 4920.00 0.00
flowbits 105616 21 21 6648 5029.00 5029.00 0.00
asn1 707096 24 0 70826 29462.00 0.00 29462.00
--------------------------------------------------------------------------------------------------------------------------------
Stats for: packet/stream payload
--------------------------------------------------------------------------------------------------------------------------------
Keyword Ticks Checks Matches Max Ticks Avg Avg Match Avg No Match
---------------- --------------- --------------- --------------- --------------- --------------- --------------- ---------------
content 1408048652 219869 140597 12311544 6404.00 7129.00 5116.00
pcre 90196860 13074 7932 13170092 6898.00 5737.00 8690.00
byte_test 11903334 2282 645 38030 5216.00 5020.00 5293.00
byte_jump 145419620 28748 142 3387470 5058.00 5073.00 5058.00
byte_extract 4391106 794 794 22934 5530.00 5530.00 0.00
--------------------------------------------------------------------------------------------------------------------------------
Stats for: post-match
--------------------------------------------------------------------------------------------------------------------------------
Keyword Ticks Checks Matches Max Ticks Avg Avg Match Avg No Match
---------------- --------------- --------------- --------------- --------------- --------------- --------------- ---------------
flowbits 1020998 149 149 45350 6852.00 6852.00 0.00
--------------------------------------------------------------------------------------------------------------------------------
Stats for: threshold
--------------------------------------------------------------------------------------------------------------------------------
Keyword Ticks Checks Matches Max Ticks Avg Avg Match Avg No Match
---------------- --------------- --------------- --------------- --------------- --------------- --------------- ---------------
threshold 2182978 365 4 26550 5980.00 5165.00 5989.00
|
1 2 3 4 5 6 7 8 9 10 11 12 13 |
|