Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-58219
This rule is designed to alert on attempts to exploit a dir traversal in VMware vCenter Server that leads to a remote code execution vulnerability in the context of the server. Attackers who exploit this can ultimately execute code remotely on the server.
1-58218
This rule is designed to alert on attempts to exploit a dir traversal in VMware vCenter Server that leads to a remote code execution vulnerability in the context of the server. Attackers who exploit this can ultimately execute code remotely on the server.
1-58217
This rule is designed to alert on attempts to exploit a dir traversal in VMware vCenter Server that leads to a remote code execution vulnerability in the context of the server. Attackers who exploit this can ultimately execute code remotely on the server.
1-58216
This rule detects the attempted exfiltration of banking credentials after a successful phishing attempt by looking for know URIs and parameters used to exfiltrate the captured credentials.
1-58215
This rule detects an attempted phishing attack designed to steal email credentials by looking for embedded picture data used in the phishing webpage.
1-58214
This rule detects an attempted phishing attack designed to steal email credentials by looking for embedded picture data used in the phishing webpage.