Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:66433
This rule looks for an HTTP request conforming to the pattern of DOGLEASH C2 messages.
1:66432
This rule looks for an TLS certificate used by DOGLEASH C2 messages.
1:66431
This rule looks content unique to the file.
1:66430
This rule looks content unique to the file.
1:66428
This rule looks for HTTP requests to the validate_binary_path endpoint that include a utility_path parameter containing a path using the storage directory. Files uploaded to the server are stored there, meaning it is potentially a malicious executable. Successful exploitation allows an attacker to execute arbitrary code on the pgAdmin server.
1:37890
This rule looks for HTTP requests targeting the file upload endpoint and containing JSP code markers in the request body. Successful exploitation could allow an attacker to place and execute malicious server‑side scripts on the affected device.