I have an assignment that is requiring me to put the following rule into Snort.
drop tcp any any -> 192.168.1.0/24 any (msg:"TCP DoS"; flow: established, to_server; flags:A; threshold: type threshold, track by_src, count 10, seconds 10;)
The rule is supposed to stop HC from doing a DoS on on SVR. I am under the impression that this rule will stop traffic heading to the ..1.0/24 sub-net stoping the 'SYN' replies that are heading to the ..1.0/24 sub-net and this will allow the server to continue opperating
The way that I see the rule, it would not work. It would block the traffic heading to the wrong location. The server is on the ..2.0/24 and ..3.0/24 nets and the traffic should be blocked from heading that direction.
My network is set up like the following:
System / LAN Segment / IP Addresses
Administrative Client (AC) / IT / 192.168.100.3/24
User Client (UC) / Corporate / 192.168.101.25/24
Hacker Client (HC) / Rogue / 192.168.13.37
pfSense Router/Firewall (3 NICS) / fwNet / 192.168.1.2
IT 192.168.100.1
Corporate 192.168.101.1
Ubuntu Router (3 NICS) / fwNet / 192.168.1.1
idsNet 192.168.2.1
Rogue 192.168.13.1
Snort IDS/IPS (2 NICS) (IDS) idsNet 192.168.2.2
sNet 192.168.3.1
Server (SRV) / sNet / 192.168.3.2
It looks ugly in the form above but I am unable to fix it now. I have tried and there is no snipping tool on this system and this is the best I can do for now.
Basically, who is correct?
Thanks in advance for the help. This is informational. The assignment is turned in and is being graded. I need to understand how this works.
Thanks again.