iSID Analyst Knowledge Base

Definitions, and additional context on iSID alerts along with helpful recommendations

(http_inspect) PROTOCOL-OTHER HTTP server response before client request

If a server sends an HTTP response without receiving a corresponding request from the client, it could indicate a misconfiguration, a potential security issue, or an attempt to exploit vulnerabilities in the server or application. This rule is a part of the HTTP inspection preprocessor in Snort. It aims to identify and alert on this unusual behavior in the HTTP protocol, which could be indicative of abnormal network activity or a potential attack. When this rule is triggered, it suggests that further investigation is needed to understand why the server is sending responses without proper client requests.

(http_inspect) POST W/O CONTENT-LENGTH OR CHUNKS

this rule is designed to flag HTTP POST requests that lack proper information about the size of the message body. This could be an indication of malformed or suspicious HTTP traffic that might need further analysis.

TDC-SOC – Possible BlackNurse attack from external source 3,3

This Snort rule is specifically crafted to detect ICMP packets with the specific type and code associated with BlackNurse attacks. The BlackNurse attack is a form of denial of service attack based on ICMP flooding. The attack is special because a modest bandwidth of 20Mbit/s can be effective for disrupting a victim's network. If a packet matches these criteria and meets the threshold defined by the detection filter, the rule triggers an alert that can indicate of an existance of the virus within the network.

SMBv3 Negotiate Protocol Request with Compression Capabilities Context

This Snort rule is specifically crafted to detect SMBv3 negotiation packets with particular content patterns. If a packet matches these patterns, the rule triggers an alert.

SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt

This Snort rule is specifically crafted to detect attempts to exploit the directory traversal vulnerability in the Cisco Security Manager's XmpFileDownloadServlet. If the specified patterns are detected in the HTTP URI, the rule triggers an alert.