Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:63597
This rule looks for a maliciously crafted executable file that exploits an escalation of privileges vulnerability in Windows devices
1:63596
This rule looks for a maliciously crafted executable file that exploits an escalation of privileges vulnerability in Windows devices
1:63591
This rule looks for a maliciously crated EXE file that will exploit an escalation of privileges vulnerability in Windows machines
1:63590
This rule looks for a maliciously crated EXE file that will exploit an escalation of privileges vulnerability in Windows machines
1:63589
This rule looks for files that contain a Windows local privilege escalation exploit.
1:63588
This rule looks for files that contain a Windows local privilege escalation exploit.