Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:64194
This rule looks for inbound DCE/RPC requests that are intended to exploit an arbitrary command execution vulnerability in the Advantech WebAccess webvrpcs service.
1:64192
This rule looks for PHP object injection patterns present in the following parameters in HTTP requests sent to the /module/api.php?mobile/createRaid endpoint on TerraMaster TOS web applications: raidtype, diskstring.
1:64191
This rule looks for CRLF (\r\n) sequences present in multiple parameters in requests to the "/admincertnewcsr.cgi" endpoint on Ivanti Connect Secure web applications.
1:64190
This rule looks for SSRF injection patterns present in the "url" parameter in HTTP requests sent to the /system/ws-control-servlet endpoint on Inductive Automation Ignition web applications.
1:63806
This rule detects a crafted HTTP request commonly used by the Grandoreiro strain of malware
1:63728
This rule alerts on network communications from the Earthworm network proxy tool. This rule may alert on any of the subcommands involved in the client-server handshake of custom TCP protocol used by Earthworm, including the establishment of a reverse socks5 tunnel from the server to the client.