Suricata Rule Development Part 1
Suricata Rule Anatomy
action protocol from_ip port -> to_ip port (msg:"Known malicious behavior, possible X malware infection"; content:"some thing"; content:"some other thing"; sid:10000001; rev:1;)Components of the Rule:
content:"User-Agent|3a 20|Go-http-client/1.1|0d 0a|Accept-Encoding|3a 20|gzip";
Example Rule Usage with PCRE
IDS/IPS Rule Development Approaches
Suricata Rule Development Examples
Example 1: Detecting PowerShell Empire
Example 2: Detecting Covenant
Example 3: Covenant Detection by Size and Counter
Example 4: Detecting Sliver C2 Implant
Last updated