Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:64021
This rule looks for binary files with opcodes known to be specific to Win.Trojan.YolkLoader variants.
1:64020
This rule looks for binary files with opcodes known to be specific to Win.Trojan.YolkLoader variants.
1:64019
This rule looks for binary files with opcodes known to be specific to Win.Trojan.YolkLoader variants.
1:64018
This rule looks for binary files with opcodes known to be specific to Win.Trojan.YolkLoader variants.
1:63806
This rule detects a crafted HTTP request commonly used by the Grandoreiro strain of malware
1:63728
This rule alerts on network communications from the Earthworm network proxy tool. This rule may alert on any of the subcommands involved in the client-server handshake of custom TCP protocol used by Earthworm, including the establishment of a reverse socks5 tunnel from the server to the client.