Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:64413
This rule looks for specially crafted HTTP requests sent to the "/openadmin/index.php" endpoint in the Informix Open Admin web application that are intended to exploit a heap buffer overflow.
1:64412
This rule looks for requests to upload arbitrary files via the "/handle_import_user.php" endpoint on NVRMini 2 devices. Attackers can utilize this endpoint to achieve remote command execution as root.
1:64411
This rule looks for requests sent to the web server running on multiple Reolink devices that contain command injection metacharacters present in the "addr1" JSON key.
1:64410
This rule looks for login requests to Reolink web servers that attempt to authenticate using the default admin credentials, "admin:123456".
1:64407
This rule is specifically looking for some unique bytecode contained in the Wolfsbane installation utility used by APTs.
1:64406
This rule alerts on file downloads of Win.Trojan.WinOS4. WinOS 4.0 is an post-exploitation framework derived from ghostRat that is used to establish persistent access to an infected machine.