Logging Application Data

Problem

You want to capture the application data from network trafficfor example MySQL, HTTP, or FTP traffic.

Solution

To see the actual application payload data in ASCII format, you can use the -C command-line option to print out payloads with character data only (no hex). You must use this in conjunction with the -d command-line option, which dumps the application layer:

C:Snortin>snort -vdC

 

Discussion

There are times when you may want to record all transactions related to a specific application. This may be for legal reasons, content checking, or usage monitoring. Another reason to log application data is to help application developers find bugs in network applications. By default, Snort displays only the header information of the packet. If you would like to see the actual payload data in ASCII format, you can use the -C command-line option. You must use this in conjunction with the -d command-line option, which dumps the application layer, as well as the -v option:

C:Snortin>snort -vdC

Running in packet dump mode

Log directory = log

 

Initializing Network Interface DeviceNPF_

{572FF0E6-9A1E-42B5-A2AF-A5A307B613EF}

 

 --= = Initializing Snort = =--

Initializing Output Plugins!

Decoding Ethernet on interface DeviceNPF_

{572FF0E6-9A1E-42B5-A2AF-A5A307B613EF}

 

 --= = Initialization Complete = =--

 

-*> Snort! <*-

Version 2.2.0-ODBC-MySQL-FlexRESP-WIN32 (Build 30)

By Martin Roesch (roesch@sourcefire.com, www.snort.org)

1.7-WIN32 Port By Michael Davis (mike@datanerds.net, 

www.datanerds.net/~mike)

1.8 - 2.x WIN32 Port By Chris Reid 

(chris.reid@codecraftconsultants.com)

 

11/01-12:15:26.305595 192.168.100.70:4435 -> 216.239.51.147:80

TCP TTL:128 TOS:0x0 ID:50695 IpLen:20 DgmLen:323 DF

***AP*** Seq: 0x880283FF Ack: 0xD0CF219E Win: 0x4470 TcpLen: 20

GET / HTTP/1.1..Accept: */*..Accept-Language: en-us..Accept-Enco

ding: gzip, deflate..User-Agent: Mozilla/4.0 (compatible; MSIE 6

.0; Windows NT 5.0)..Host: www.google.com..Connection: Keep-Aliv

e..Cookie: PREF=ID=1c67539b15a71c3d:TM=1078849240:LM=1078849469:

TB=2:S=8BR7CQ3QdlExQhyo....

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

 

11/01-12:15:26.341166 216.239.51.147:80 -> 192.168.100.70:4435

TCP TTL:52 TOS:0x10 ID:34185 IpLen:20 DgmLen:1400

***AP*** Seq: 0xD0CF219E Ack: 0x8802851A Win: 0x7AE4 TcpLen: 20

HTTP/1.1 200 OK..Cache-Control: private..Content-Type: text/html

..Content-Encoding: gzip..Server: GWS/2.1..Content-Length: 1192.

.Date: Thu, 01 Jul 2004 16:14:53 GMT...............Vmo.6..._.([b

..h.q.....X....t-.a..Z:ID$.&)+^....^...i.....{.w.....,. ..DA....

Z5.e.W..KaA..]+.H7.=...:.9.s........c/.,..D.Rf........kw<.Y.d=..

.....oR49NY.......#.....<........'.p.....&...'{.|...(......@;..5

W.?.dZ..r).I...D.U...S...80.ac.t&zU...9L.Y.....C...~2!..Wa..Y..

.l......4m..8.,...Q....1`lQ.YH...'$..0..d.H.$iF(...'^f..8.(/Y..

.2.~.S..<.yx..%..g.......Iks.)...u.h..{...T...&Rh...q...J.......

....!..)..$..?B..."........>.<{'K%....VL.%.......bE...3...kH}4.

....o.z..p..5..l

.a6kU....4...M.(.....F.....V.>.rvP.....3r^.W...Y..........m..V.a

..SM.)KVL..|i.hK..m7...N7..=~......&.t&..3Oj.Ld....+e.+.w....l..

.Z..]..w...k.e....}...`H[7...4+..2&[y<.W.}G..+..c.`..j....e.Y..J

.....n.m.AE..?.......A...^.)........{...^.(m.4w........_......N

(.....P?.%=....9.j.-..@m.r..2[.)....sz..~.bx.u...x.....K/..]A..

...4....u...woF....[=$q,.z~8.....]Q.29....F...G.^....D..EG..F..A

..._M.......^...

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

 

11/01-12:15:26.373894 192.168.100.70:4435 -> 216.239.51.147:80

TCP TTL:128 TOS:0x0 ID:50697 IpLen:20 DgmLen:421 DF

***AP*** Seq: 0x8802851A Ack: 0xD0CF26EE Win: 0x3F20 TcpLen: 20

GET /images/logo.gif HTTP/1.1..Accept: */*..Referer: http://www.

google.com/..Accept-Language: en-us..Accept-Encoding: gzip, defl

ate..If-Modified-Since: Mon, 22 Mar 2004 23:04:23 GMT..User-Agen

t: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)..Host: www

.google.com..Connection: Keep-Alive..Cookie: PREF=ID=1c67539b15a

71c3d:TM=1078849240:LM=1078849469:TB=2:S=8BR7CQ3QdlExQhyo....

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

You can use the -C and -d command-line options in any of Snort's modes: packet dump, packet logger, and NIDS. Although Snort inspects the payload information, it doesn't print or log this information by default.

See Also

Recipe 1.16

Recipe 1.17

Recipe 1.18

Logging to the Windows Event Viewer

Installing Snort from Source on Unix

Logging to a File Quickly

How to Build Rules

Detecting Stateless Attacks and Stream Reassembly

Managing Snort Sensors

Generating Statistical Output from Snort Logs

Monitoring Network Performance

Index



Snort Cookbook
Snort Cookbook
ISBN: 0596007914
EAN: 2147483647
Year: 2006
Pages: 167

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net