Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:63316
This rule alerts on beacon messages from the Mythic-C2 malware family when configured for JSON/HTTP CNC. The indicated endpoint is infected.
1:63315
This rule alerts on beacon messages from the Mythic-C2 malware family when configured for JSON/HTTP CNC. The indicated endpoint is infected.
1:63314
This rule looks for request parameters used to execute commands on a D-LINK NAS product.
1:63313
This rule looks for request parameters used to execute commands on a D-LINK NAS product.
1:63312
This rule looks for inbound emails that contain 'file://' URIs and that contain a '!', which could indicate a one-click attack attempt against a Microsoft Outlook user.
1:63311
This rule looks for the backdoor user "messagebus" and an empty "passwd" in the request paramters sent to a D-LINK NAS product.