Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-56892
This rule looks for communication related to BASICPIPESHELL
1-56891
This rule looks for communication related to BASICPIPESHELL
1-56890
This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.
1-56889
This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.
1-56888
This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.
1-56887
This rule will look for patterns used in the malicious BumbleBee webshell when any access attempt to is detected in the local network. This webshell allows an attacker to control a remote windows server with the execution of commands and the upload and download of files.