##! Detect browser plugins as they leak through requests to Omniture ##! advertising servers. @load base/protocols/http @load base/frameworks/software module HTTP; export { redef record Info += { ## Indicates if the server is an omniture advertising server. omniture: bool &default=F; }; redef enum Software::Type += { ## Identifier for browser plugins in the software framework. BROWSER_PLUGIN }; } event http_header(c: connection, is_orig: bool, name: string, value: string) &priority=3 { if ( is_orig ) { if ( name == "X-FLASH-VERSION" ) { # Flash doesn't include it's name so we'll add it here since it # simplifies the version parsing. value = cat("Flash/", value); Software::found(c$id, [$unparsed_version=value, $host=c$id$orig_h, $software_type=BROWSER_PLUGIN]); } } else { # Find if the server is Omniture if ( name == "SERVER" && /^Omniture/ in value ) c$http$omniture = T; } } event log_http(rec: Info) { # We only want to inspect requests that were sent to omniture advertising # servers. if ( rec$omniture && rec?$uri ) { # We do {5,} because sometimes we see p=6 in the urls. local parts = split_n(rec$uri, /&p=([^&]{5,});&/, T, 1); if ( 2 in parts ) { # We do sub_bytes here just to remove the extra extracted # characters from the regex split above. local sw = sub_bytes(parts[2], 4, |parts[2]|-5); local plugins = split(sw, /[[:blank:]]*;[[:blank:]]*/); for ( i in plugins ) Software::found(rec$id, [$unparsed_version=plugins[i], $host=rec$id$orig_h, $software_type=BROWSER_PLUGIN]); } } }