rule2alert icon indicating copy to clipboard operation
rule2alert copied to clipboard

Improvements of/over the original rule2alert

Description:

Rule2Alert parses snort rules and generates packets on the fly that would alert the IDS. It can either write the packets to a pcap or send the packets directly to the IDS.

Amended:

Rule2Alert parses Suricata and/or Snort specific rules and generates packets on the fly that would alert the IDS.

This development has been concentrated on/for Suricata IDPS on top of(adding to) the existing rule2alert code available here -> http://code.google.com/p/rule2alert/ under GNU GPL v2 (http://www.gnu.org/licenses/old-licenses/gpl-2.0.html).

This develpment works both for Suricata (http://suricata-ids.org/) and Snort(http://www.snort.org/). Rule2Alert is still in development status. It is an improvement of the original version (alpha) but not all keywords are supported and issues may occur. Please read on carefully.

Assumptions:

You have python-yaml (apt-get install python-yaml on Ubuntu/Debian like systems) to be able to parse  Suricata's config
You have Scapy installed on your system
You have either Suricata or Snort installed on your system 

A list of the fixes and improvements →

Fixed issues:

  • dsize:0 – fixed
  • dsize:>0 fixed
  • no content in rule – fixed (added)
  • issue with sid 598 /depth/offset multiple times – fixed
  • snort config parser - never worked since introduction of new "ipvar", instead of "var" in the snort config

Rule language keywords support added:

  • rawbytes
  • tag
  • http_uri - allowed 4K more rule/pcap pairs
  • flowbits
  • threshold:..., count 1 - (only "count 1") added
  • “alert http …..”
  • “alert ftp …..”
  • “alert ip …..”

New features:

  • IPv6 support
  • Dot1Q (VLAN tag ID) - IEEE 802.1Q (NOTE latest community Scapy needed - http://hg.secdev.org/scapy-com)
  • QinQ (double tagged) - IEEE 802.1ad also known as IEEE 802.QinQ (NOTE latest community Scapy needed - http://hg.secdev.org/scapy-com)
  • suricata.yaml parser
  • logging of separate rules with corresponding pcaps that fail to generate an alert (rule to pcap pair)
  • logging of separate rules with corresponding pcaps that do generate an alert (rule to pcap pair)
  • choose(or point) to a custom location for suricata.yaml, suricata binary or log directory (see examples below)

EXAMPLE 1 - to make use of the above two (in the rules2alert directory execute):

python r2a.py -C /etc/suricata/suricata.yaml -f rules/emerging-all.rules -w test1.pcap -F -T -e 1.1.1.1 -m 192.168.1.1

  • given that you have emerging-all.rules in your rules directory under rules2alert.

EXAMPLE 2 - VLAN ID , Dot1Q:

python r2a.py -C /etc/suricata/suricata.yaml -f /root/Work/Python/rules2alerts/needed/rules/emerging-all.rules -w test1.pcap -F -T -e 1.1.1.1 -m 192.168.1.1 --Dot1Q


EXAMPLE 3 - QinQ:

python r2a.py -C /etc/suricata/suricata.yaml -f /root/Work/Python/rules2alerts/needed/rules/emerging-all.rules -w test1.pcap -F -T -e 1.1.1.1 -m 192.168.1.1 --QinQ

After whch you will have all the rule/pcap pairs under the rules2alert/output directory.


EXAMPLE 4 - custom location for suricata.yaml, suricata binary , log directory and Dot1Q enabled:

python r2a.py -C /root/Work/tmp/TMP/suricata.yaml -f /root/Work/Python/rules2alerts/needed/rules/emerging-all.rules -w test1.pcap -F -T -e 1.1.1.1 -m 192.168.1.1 -B /usr/bin/suricata -L /root/Work/tmp/TMP/ --Dot1Q


EXAMPLE 5 - IPv6 (-6 option) enabled plus custom location for suricata.yaml, suricata binary , log directory using HOME_NET and EXTERNAL_NET from suricata.yaml:

python r2a.py -C /etc/suricata/suricata.yaml -f /root/Work/Python/rules2alerts/needed/rules/emerging-all.rules -w test1.pcap -F -T -B /usr/bin/suricata -L /root/Work/tmp/TMP/ -6

You can use the generated output rule/pcap pairs with the RegressionScript - https://github.com/pevma/RegressionScript

NOTE: Due to lack of not yet implemented support for some rule language keywords not all 'failed' rules/pcap pairs are real failures.