Snort mailing list archives
Rules for ssh exploit
From: Russell Fulton <r.fulton () auckland ac nz>
Date: Fri, 2 Nov 2001 16:34:57 +1300 (NZDT)
Hi All, Does any one have snort rules for detecting the recent spate of ssh attacks or are all the usable fingerprints hidden by the encryption? Russell Fulton, Computer and Network Security Officer The University of Auckland, New Zealand _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Rules for ssh exploit Russell Fulton (Nov 01)
- Re: Rules for ssh exploit Ralf Hildebrandt (Nov 12)
- Re: Rules for ssh exploit Fyodor (Nov 12)
- Re: Rules for ssh exploit Martin Roesch (Nov 12)
- Re: Rules for ssh exploit Ralf Hildebrandt (Nov 12)