MS17-010

local-1.rules

# ----------------
# LOCAL RULES
# ----------------
# This file intentionally does not come with signatures.  Put your local
# additions here.

alert tcp any any <> any 445  (msg: "Exploit Detected!"; content: "IPC$"; sid: 100001; rev:1;)

Run snort:

ubuntu@ip-10-10-234-43:~/Desktop/Exercise-Files/TASK-7 (MS17-10)$ sudo snort -c local-1.rules -dev -l . -r ms-17-010.pcap
ubuntu@ip-10-10-234-43:~/Desktop/Exercise-Files/TASK-7 (MS17-10)$ sudo snort -d -r snort.log.1669590408 
Running in packet dump mode

        --== Initializing Snort ==--
Initializing Output Plugins!
pcap DAQ configured to read-file.
Acquiring network traffic from "snort.log.1669590408".

        --== Initialization Complete ==--

   ,,_     -*> Snort! <*-
  o"  )~   Version 2.9.7.0 GRE (Build 149) 
   ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
           Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
           Copyright (C) 1998-2013 Sourcefire, Inc., et al.
           Using libpcap version 1.9.1 (with TPACKET_V3)
           Using PCRE version: 8.39 2016-06-14
           Using ZLIB version: 1.2.11

Commencing packet processing (pid=3117)
WARNING: No preprocessors configured for policy 0.
05/18-08:12:07.219861 192.168.116.149:49368 -> 192.168.116.138:445
TCP TTL:128 TOS:0x0 ID:575 IpLen:20 DgmLen:117 DF
***AP*** Seq: 0xFF7320A3  Ack: 0x223125FA  Win: 0xFF  TcpLen: 20
00 00 00 49 FF 53 4D 42 75 00 00 00 00 18 01 20  ...I.SMBu...... 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 2F 4B  ............../K
00 08 C5 5E 04 FF 00 00 00 00 00 01 00 1C 00 00  ...^............
5C 5C 31 39 32 2E 31 36 38 2E 31 31 36 2E 31 33  \\192.168.116.13
38 5C 49 50 43 24 00 3F 3F 3F 3F 3F 00           8\IPC$.?????.

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+