Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:36070
This event is generated when known obfuscated javascript that is often associated with malicious content is detected. Impact: Potential Corporate Privacy Violation Details: Ease of Attack:
1:63316
This rule alerts on beacon messages from the Mythic-C2 malware family when configured for JSON/HTTP CNC. The indicated endpoint is infected.
1:63315
This rule alerts on beacon messages from the Mythic-C2 malware family when configured for JSON/HTTP CNC. The indicated endpoint is infected.
1:63314
This rule looks for request parameters used to execute commands on a D-LINK NAS product.
1:63313
This rule looks for request parameters used to execute commands on a D-LINK NAS product.
1:63312
This rule looks for inbound emails that contain 'file://' URIs and that contain a '!', which could indicate a one-click attack attempt against a Microsoft Outlook user.