You have been investigating an apparent internal attack against your company’s Windows Server 2008 file servers. Suspicious packets have been captured during routine audits. You need to configure Snort to log these suspicious files. Your internal network address is with a subnet mask of Your file servers’ addresses are and Each of these file servers is running Snort as an HIDPS.
The suspicious packets have the following characteristics:

  • ● They have come from different systems inside your network.
  • ● The packets all include the word release between the 1000th and 1100th bytes.
  • ● The packets use TCP as their Transport layer protocol.
  • ● The packets appear to be trying to exploit vulnerabilities in the Windows implementation of SMB over IP.

You need to write a rule to be included in the rules directory of each server’s Snort installa- tion. These two rules must be as specific as possible so that the system logs only the packets that meet the signature of the suspicious network activity. The logged packets should be labeled as “Possible Internal SMB over IP Attack.” You must perform research beyond the scope of this chapter to find the needed information and create the rules.

"Do you want an original answer to this question?

Yes No

"Is this question part of your assignment? Essay
.We Can Help!

Order Now