-
Notifications
You must be signed in to change notification settings - Fork 911
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add PE32/PE32+ risk detection (detect transmitted windows executables). #2312
Conversation
37925d6
to
9c818c2
Compare
I think it makes sense to also add HTTP content-type check for |
I think there is already such check in |
Yeah, that's a great idea. |
Yes, it's there, but I meant something else: to classify flows with that content-type as |
Yea, makes also sense. I'll do both. |
9c818c2
to
c7ee7d4
Compare
|
I'll do a proper review later, but I have an initial question: is there any specific reasons why this PE stuff is treated as a new protocol instead of a new flow risk? |
Initially, I did not want to create a new protocol id for that. |
Just an idea. Your current code basically checks for PE transfer only for unknown traffic (because when/if the flow is classified, PE dissector is not called anymore). [let's ignore the HTTP case which seems easy to handle]
This way, we don't need a new protocol and we can set a risk. |
@IvanNardi |
6cae419
to
f1d23e3
Compare
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you
Please sign (check) the below before submitting the Pull Request:
Link to the related issue:
Describe changes:
The risk detection is far from perfect e.g. the amount of packets it does look for is hard coded. I think it might be better to let the user decide how many packets should checked for a possible PE transmission. It also assumes that the first 0x3C + 4 bytes are transmitted as one packet e.g. w/o fragmentation/retransmission.