Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:63728
This rule alerts on network communications from the Earthworm network proxy tool. This rule may alert on any of the subcommands involved in the client-server handshake of custom TCP protocol used by Earthworm, including the establishment of a reverse socks5 tunnel from the server to the client.
1:63727
This rule alerts on network communications from the Earthworm network proxy tool. This rule may alert on any of the subcommands involved in the client-server handshake of custom TCP protocol used by Earthworm, including the establishment of a reverse socks5 tunnel from the server to the client.
1:63618
This rule looks for command injection metacharacters in the "value" JSON key of a HTTP client body
1:63455
This rule alerts on traffic that exploits the vulnerability outlined in CVE-2022-40022. It is looking for characters that can indicate an attempted command injection in the vulnerable parameter.
1:63454
This rule alerts on traffic that exploits the vulnerability outlined in CVE-2022-40022. It is looking for characters that can indicate an attempted command injection in the vulnerable parameter.
1:63453
This rule alerts on traffic that exploits the vulnerability outlined in CVE-2022-40022. It is looking for characters that can indicate an attempted command injection in the vulnerable parameter.