Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-60642
This rule detects a specially crafted request that can exploit SSRF to achieve remote code execution on Microsoft Exchange Server
1-60641
This rule detects the network activity of antSword webshell hosted on a potentially compromised webserver.
1-60640
This rule detects the network activity of antSword webshell hosted on a potentially compromised webserver.
1-60639
This rule detects the request destined to a DLL listener that is hosted on a compromised web server.
1-60638
This rule detects the request destined to a DLL listener that is hosted on a compromised web server.
1-60637
This rule detects the network activity of antSword webshell hosted on a potentially compromised webserver.