Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:63784
This rule looks for executable code that exploits CVE-2022-2586, a local privilege escalation vulnerability in the Linux kernel
1:63783
This rule looks for executable code that exploits CVE-2022-2586, a local privilege escalation vulnerability in the Linux kernel
1:63777
This rule detects an implementation of TinyShell Backdoor on 32-bit Linux systems
1:63776
This rule detects an implementation of TinyShell Backdoor on 32-bit Linux systems
1:63772
This rule detects a known CobaltStrike beacon endpoint
1:63771
This rule looks for a malicious injection pattern sent to a vulnerable parameter within a maliciously crafted GET request towards the Rejeto HTTP File Server