--- /dev/null
+PCAP
+====
+
+Pcap from https://forum.suricata.io/t/suricata-5-0-1-in-ips-mode/94/21
--- /dev/null
+cac5f74a1e146d6de26845e3e03732c01167e4bbb4333e76889b538c9bd30362
+537aea248165d3e82e48c4808b92e048bd1593ecbcb99d661c3c776204cd96a2
+be331893e44dcad93536b7b5cd3104abc9174ab66086ea5ad8bd4b2618222780
+3f6a4dffd4fd653b53b621349d5167d3cfa3cad926c166e7e24b88d3c9a06acf
+abe7c7b40883a7b59e6493d0f9a9b4b85035f22ee6195da2b188c2072279634f
--- /dev/null
+%YAML 1.1
+---
+
+outputs:
+ - eve-log:
+ enabled: yes
+ filetype: regular
+ types:
+ - alert
+ - drop:
+ flows: all
+ alerts: yes
+ - files
+ - http
+ - flow
--- /dev/null
+alert http any any -> any any (msg:"File stored: EXE"; fileext:"exe"; filestore; sid:1; rev:1;)
+drop http any any -> any any (msg:"Malicious file detected"; filesha256:blacklist; xbits:set, blocked_http, track ip_pair, expire 3600; sid:2; rev:2;)
+drop http any any -> any any (msg:"Block 206 response for IPPair"; content:"206"; http_stat_code; xbits:isset, blocked_http, track ip_pair; priority:1; sid:3; rev:1;)
+#drop http any any -> any any (msg:"Request blocked for IPPair"; content:"GET"; http_method; content:"exe"; http_uri; xbits:isset, blocked_http, track ip_pair; priority:1; sid:4; rev:2;)
--- /dev/null
+requires:
+ features:
+ - HAVE_LIBJANSSON
+ - HAVE_NSS
+ min-version: 4.1.0
+
+args:
+ - --simulate-ips
+ - --runmode=single
+ - --no-random
+
+checks:
+ - filter:
+ count: 2
+ match:
+ event_type: alert
+ alert.signature_id: 1
+ - filter:
+ count: 1
+ match:
+ event_type: alert
+ alert.signature_id: 2
+ - filter:
+ count: 1
+ match:
+ event_type: drop
+ alert.signature_id: 2
+ pcap_cnt: 103
+ - filter:
+ count: 8
+ match:
+ event_type: drop
+ flow_id: 746850855319537
+ - filter:
+ count: 1
+ match:
+ event_type: alert
+ alert.signature_id: 3
+ pcap_cnt: 135
+ - filter:
+ count: 1
+ match:
+ event_type: drop
+ alert.signature_id: 3
+ pcap_cnt: 135
+ - filter:
+ count: 7
+ match:
+ event_type: drop
+ flow_id: 948787333709074
--- /dev/null
+PCAP
+====
+
+Pcap from https://forum.suricata.io/t/suricata-5-0-1-in-ips-mode/94/14
--- /dev/null
+cac5f74a1e146d6de26845e3e03732c01167e4bbb4333e76889b538c9bd30362
+537aea248165d3e82e48c4808b92e048bd1593ecbcb99d661c3c776204cd96a2
+be331893e44dcad93536b7b5cd3104abc9174ab66086ea5ad8bd4b2618222780
+3f6a4dffd4fd653b53b621349d5167d3cfa3cad926c166e7e24b88d3c9a06acf
+abe7c7b40883a7b59e6493d0f9a9b4b85035f22ee6195da2b188c2072279634f
--- /dev/null
+%YAML 1.1
+---
+
+outputs:
+ - eve-log:
+ enabled: yes
+ filetype: regular
+ types:
+ - alert
+ - drop:
+ flows: all
+ alerts: yes
+ - files
+ - http
+ - flow
--- /dev/null
+alert http any any -> any any (msg:"File stored: EXE"; fileext:"exe"; filestore; sid:1; rev:1;)
+drop http any any -> any any (msg:"Malicious file detected"; filesha256:blacklist; sid:2; rev:2;)
--- /dev/null
+requires:
+ features:
+ - HAVE_LIBJANSSON
+ - HAVE_NSS
+ min-version: 4.1.0
+
+args:
+ - --simulate-ips
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: alert
+ alert.signature_id: 1
+ - filter:
+ count: 1
+ match:
+ event_type: alert
+ alert.signature_id: 2
+ - filter:
+ count: 1
+ match:
+ event_type: drop
+ pcap_cnt: 929
+ - filter:
+ count: 43
+ match:
+ event_type: drop