On Tue, Oct 31, 2017, David Jones <djo...@ena.com> wrote: 
>Add the Lashback RBL.  I am trying to get this added to the default SA 
>rules.  See my post on 2017-10-17 in the following link and increase the 
>scores after some testing.

David, after your Lashback post, I had added it to my FP pipeline
(i.e. run from the desktop, NOT real-time) for evaluation, however
I had made a minor setup mistake.
Thanks for the reminder that prompted me to check and fix that. :)
If that proves useful, I'll add it to my post-gateway real-time
stack.

Thanks for your other suggestions. :)


Benny:
Thanks for the clamav submission page, however it did not work with
my browser (after NIMDA, I turned "off" all the whizbang security 
nightmare stuff). :(
You or anyone else is welcome to submit it there or anywhere. :)

"Rupert":
That was one of 30 that passed gateway RBL testing and
(plain vanilla) ClamAV.
It was _NOT_ "addressed to someone-else".
If you do a bit of DNS analysis on the Received headers, it will be
clearer.
You are correct that it failed SPF. :)
I checked all the others, and they too failed, which is somewhat
unusual.


*** All:
*** Clarification: 100% of these are being caught by my filters.
I posted to share a live sample, since there's lots of technical
analysis articles but I have not yet seen complete samples of all
the file vectors that are possible.

I'm mainly interested in insights into CONTENT based rules,
and more diverse samples. :)

For example, after the first wave of news, I added a word match rule
for "DDEAUTO", which has _NOT_ yet triggered.  That does trigger if
I change it to a gappy-word rule, after de-tagging these XML pairs:
        <w:instrText>DDE</w:instrText>
        <w:instrText>AUTO</w:instrText>
I had not expected that.

I particularly want to see an .ics sample.
Has anybody else seen much/any DDE attack variants?
        - "Chip"


Reply via email to