Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:64488
This rule looks for inbound HTTP requests to Fortinet FortiOS devices that are intended to exploit an authentication bypass vulnerability.
1:64487
This rule detects a fake ad for AnyDesk serving malware by looking for the fake download link served in the ad.
1:64484
This rule looks for command injection metacharacters present in the following JSON keys in HTTP requests sent to the /api/v1/dags/ endpoint on Apache Airflow Directed Acyclic Graph web applications: dag_run_id.
1:64483
This rule looks for path traversal sequences present in HTTP requests sent to a known vulnerable endpoint present in the Mitel MiCollab NuPoint Unified Messaging (NPM) component.
1:64482
This rule looks for a TCP conforming to the pattern of DateGate C2 messages.
1:64481
This rule alerts on C2 communications from known information stealing malware. The indicated endpoint is likely infected with a malicious application that is trying to steal sensitive data.