]> git.ipfire.org Git - thirdparty/suricata-verify.git/commitdiff
Adds test for krb5_msg_type keyword 1198/head
authorEloy Pérez González <zer1t0ps@protonmail.com>
Fri, 22 Oct 2021 10:44:03 +0000 (12:44 +0200)
committerJason Ish <jason.ish@oisf.net>
Fri, 12 May 2023 17:23:46 +0000 (11:23 -0600)
tests/krb5-krb5_msg_type/README.md [new file with mode: 0644]
tests/krb5-krb5_msg_type/input.pcap [new file with mode: 0644]
tests/krb5-krb5_msg_type/test.rules [new file with mode: 0644]
tests/krb5-krb5_msg_type/test.yaml [new file with mode: 0644]

diff --git a/tests/krb5-krb5_msg_type/README.md b/tests/krb5-krb5_msg_type/README.md
new file mode 100644 (file)
index 0000000..7ceaa05
--- /dev/null
@@ -0,0 +1,3 @@
+# PCAP
+
+The pcap included contains kerberos traffic generated from a Windows server 2019 with the klist tool.
diff --git a/tests/krb5-krb5_msg_type/input.pcap b/tests/krb5-krb5_msg_type/input.pcap
new file mode 100644 (file)
index 0000000..7b04515
Binary files /dev/null and b/tests/krb5-krb5_msg_type/input.pcap differ
diff --git a/tests/krb5-krb5_msg_type/test.rules b/tests/krb5-krb5_msg_type/test.rules
new file mode 100644 (file)
index 0000000..18cd2fe
--- /dev/null
@@ -0,0 +1,5 @@
+alert krb5 any any -> any any (msg:"AS-REQ"; krb5_msg_type:10; sid:10;)
+alert krb5 any any -> any any (msg:"AS-REP"; krb5_msg_type:11; sid:11;)
+alert krb5 any any -> any any (msg:"TGS-REQ"; krb5_msg_type:12; sid:12;)
+alert krb5 any any -> any any (msg:"TGS-REP"; krb5_msg_type:13; sid:13;)
+alert krb5 any any -> any any (msg:"KRB-ERROR"; krb5_msg_type:30; sid:30;)
\ No newline at end of file
diff --git a/tests/krb5-krb5_msg_type/test.yaml b/tests/krb5-krb5_msg_type/test.yaml
new file mode 100644 (file)
index 0000000..3a90f31
--- /dev/null
@@ -0,0 +1,42 @@
+# *** Add configuration here ***
+requires:
+  min-version: 7
+  features:
+    - RUST
+
+args:
+- -k none
+
+checks:
+- filter:
+    count: 2
+    match:
+      event_type: alert
+      alert.signature_id: 10
+
+- filter:
+    count: 1
+    match:
+      event_type: alert
+      alert.signature_id: 11
+
+- filter:
+    count: 3
+    match:
+      event_type: alert
+      alert.signature_id: 12
+
+- filter:
+    count: 3
+    match:
+      event_type: alert
+      alert.signature_id: 13
+
+- filter:
+    count: 1
+    match:
+      event_type: alert
+      alert.signature_id: 30
+
+
+