Longtime TaoSecurity Blog readers are likely to remember me mentioning www.testmyids.com. This is a Web site that returns nothing more than
uid=0(root) gid=0(root) groups=0(root)
This content triggers a Snort intrusion detection system alert, due to the signature
alert ip any any -> any any (msg:"GPL ATTACK_RESPONSE id check returned root"; content:"uid=0|28|root|29|"; fast_pattern:only; classtype:bad-unknown; sid:2100498; rev:8;)
You can see the Web page in Firefox, and the alert in Sguil, below.
A visit to this Web site is a quick way to determine if your NSM sensor sees what you expect it to see, assuming you're running a tool that will identify the activity as suspicious. You might just want to ensure your other NSM data records the visit, as well.
Site owner Chas Tomlin emailed me today to let me know he's adding some new features to www.testmyids.com. You can read about them in this blog post. For example, you could download a malicious .exe, or other files.
Chas asked me what other sorts of tests I might like to see on his site. I'm still thinking about it. Do you have any ideas?